Compare commits
36 Commits
9942d94c94
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
| db861cd698 | |||
| b9a622c9d1 | |||
| 75891025d0 | |||
| d68ce8d4f0 | |||
| b081e52d6e | |||
| 310e4867d5 | |||
| bfcb2f931f | |||
| 151ad13853 | |||
| 0132e71c88 | |||
| 90e21bc5ae | |||
| e2edd4070a | |||
| d461cae077 | |||
| 49793e2929 | |||
| 72696dea70 | |||
| 084a1828b2 | |||
| 88c2f8aa51 | |||
| 6d1f450f32 | |||
| c263d02b36 | |||
| f5169e8a8f | |||
| 2686ca6bcf | |||
| 8bc98a321d | |||
| 7a3808ba59 | |||
| 571fdd900f | |||
| 0abee3f7df | |||
| baca2fb4d3 | |||
| d32f7d4b89 | |||
| 9dc7de1b41 | |||
| 806f0359d0 | |||
| 23c98e14df | |||
| d0d7d26671 | |||
| 1b00f503c8 | |||
| a1a11c10e2 | |||
| eec45cac71 | |||
| 5266872c2b | |||
| 85c0736c8d | |||
| 0ea241c5db |
9
.gitmodules
vendored
9
.gitmodules
vendored
@@ -4,3 +4,12 @@
|
||||
[submodule "dependencies/tlibc"]
|
||||
path = dependencies/tlibc
|
||||
url = https://timerix.ddns.net/git/timerix/tlibc.git
|
||||
[submodule "dependencies/tlibtoml"]
|
||||
path = dependencies/tlibtoml
|
||||
url = https://timerix.ddns.net/git/Timerix/tlibtoml.git
|
||||
[submodule "dependencies/tsqlite"]
|
||||
path = dependencies/tsqlite
|
||||
url = https://timerix.ddns.net/git/Timerix/tsqlite.git
|
||||
[submodule "dependencies/tim"]
|
||||
path = dependencies/tim
|
||||
url = https://timerix.ddns.net/git/Timerix/tim.git
|
||||
|
||||
5
.vscode/c_cpp_properties.json
vendored
5
.vscode/c_cpp_properties.json
vendored
@@ -5,9 +5,12 @@
|
||||
"defines": [],
|
||||
"includePath": [
|
||||
"src",
|
||||
"include",
|
||||
"dependencies/BearSSL/inc",
|
||||
"dependencies/BearSSL/src",
|
||||
"dependencies/tlibc/include",
|
||||
"dependencies/tlibtoml/include",
|
||||
"dependencies/tsqlite/include",
|
||||
"dependencies/tim/include",
|
||||
"${default}"
|
||||
],
|
||||
"cStandard": "c99"
|
||||
|
||||
68
.vscode/launch.json
vendored
68
.vscode/launch.json
vendored
@@ -2,29 +2,71 @@
|
||||
"version": "0.2.0",
|
||||
"configurations": [
|
||||
{
|
||||
"name": "gdb_debug",
|
||||
"name": "(gdb) Client | Build and debug",
|
||||
"type": "cppdbg",
|
||||
"request": "launch",
|
||||
"cwd": "${workspaceFolder}/bin",
|
||||
"program": "${workspaceFolder}/bin/tcp-chat",
|
||||
"windows": {
|
||||
"program": "${workspaceFolder}/bin/tcp-chat.exe",
|
||||
"externalConsole": true
|
||||
},
|
||||
"preLaunchTask": "build_exec_dbg",
|
||||
|
||||
"stopAtEntry": false,
|
||||
"externalConsole": false,
|
||||
"internalConsoleOptions": "neverOpen",
|
||||
"MIMode": "gdb",
|
||||
"miDebuggerPath": "gdb"
|
||||
},
|
||||
{
|
||||
"name": "(gdb) Client | Just debug",
|
||||
"type": "cppdbg",
|
||||
"request": "launch",
|
||||
"cwd": "${workspaceFolder}/bin",
|
||||
"program": "${workspaceFolder}/bin/tcp-chat",
|
||||
"windows": {
|
||||
"program": "${workspaceFolder}/bin/tcp-chat.exe",
|
||||
"externalConsole": true
|
||||
},
|
||||
|
||||
"stopAtEntry": false,
|
||||
"externalConsole": false,
|
||||
"internalConsoleOptions": "neverOpen",
|
||||
"MIMode": "gdb",
|
||||
"miDebuggerPath": "gdb"
|
||||
},
|
||||
|
||||
{
|
||||
"name": "(gdb) Server | Build and debug",
|
||||
"type": "cppdbg",
|
||||
"request": "launch",
|
||||
"cwd": "${workspaceFolder}/bin",
|
||||
"program": "${workspaceFolder}/bin/tcp-chat",
|
||||
"windows": { "program": "${workspaceFolder}/bin/tcp-chat.exe" },
|
||||
"args": [ "-l" ],
|
||||
"preLaunchTask": "build_exec_dbg",
|
||||
|
||||
"stopAtEntry": false,
|
||||
"cwd": "${workspaceFolder}/bin",
|
||||
"externalConsole": false,
|
||||
"internalConsoleOptions": "neverOpen",
|
||||
"MIMode": "gdb",
|
||||
"miDebuggerPath": "gdb",
|
||||
"setupCommands": [
|
||||
{
|
||||
"text": "-enable-pretty-printing",
|
||||
"ignoreFailures": true
|
||||
},
|
||||
{
|
||||
"text": "-gdb-set disassembly-flavor intel",
|
||||
"ignoreFailures": true
|
||||
}
|
||||
]
|
||||
"miDebuggerPath": "gdb"
|
||||
},
|
||||
{
|
||||
"name": "(gdb) Server | Just debug",
|
||||
"type": "cppdbg",
|
||||
"request": "launch",
|
||||
"cwd": "${workspaceFolder}/bin",
|
||||
"program": "${workspaceFolder}/bin/tcp-chat",
|
||||
"windows": { "program": "${workspaceFolder}/bin/tcp-chat.exe" },
|
||||
"args": [ "-l" ],
|
||||
|
||||
"stopAtEntry": false,
|
||||
"externalConsole": false,
|
||||
"internalConsoleOptions": "neverOpen",
|
||||
"MIMode": "gdb",
|
||||
"miDebuggerPath": "gdb"
|
||||
}
|
||||
]
|
||||
}
|
||||
35
README.md
Normal file
35
README.md
Normal file
@@ -0,0 +1,35 @@
|
||||
# tcp-chat
|
||||
|
||||
## Build
|
||||
1. Clone this repository with submodules.
|
||||
```
|
||||
git clone --recurse-submodules --depth 0 https://timerix.ddns.net/git/Timerix/tcp-chat.git
|
||||
```
|
||||
|
||||
2. Install [cbuild](https://timerix.ddns.net/git/Timerix/cbuild/releases).
|
||||
Select latest version compatible with the one in `project.config`.
|
||||
Example: For `2.3.0` download latest `2.3.x`.
|
||||
|
||||
|
||||
3. Build executable
|
||||
```
|
||||
cd tcp-chat
|
||||
cbuild build_exec
|
||||
```
|
||||
|
||||
|
||||
## Usage
|
||||
**Client:**
|
||||
```sh
|
||||
cd bin
|
||||
./tcp-chat
|
||||
```
|
||||
**Server:**
|
||||
1. ```sh
|
||||
cp tcp-chat-server.toml.default bin/tcp-chat-server.toml
|
||||
```
|
||||
2. Edit config
|
||||
3. ```sh
|
||||
cd bin
|
||||
./tcp-chat -l
|
||||
```
|
||||
1
dependencies/tim
vendored
Submodule
1
dependencies/tim
vendored
Submodule
Submodule dependencies/tim added at ee6375f553
19
dependencies/tim.config
vendored
Normal file
19
dependencies/tim.config
vendored
Normal file
@@ -0,0 +1,19 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
# This is a dependency config.
|
||||
# You can copy it to another cbuild project to add this lib as dependency.
|
||||
|
||||
DEP_WORKING_DIR="$DEPENDENCIES_DIR/tim"
|
||||
if [[ "$TASK" = *_dbg ]]; then
|
||||
dep_build_target="build_static_lib_dbg"
|
||||
else
|
||||
dep_build_target="build_static_lib"
|
||||
fi
|
||||
DEP_PRE_BUILD_COMMAND=""
|
||||
DEP_BUILD_COMMAND="cbuild $dep_build_target"
|
||||
DEP_POST_BUILD_COMMAND=""
|
||||
DEP_CLEAN_COMMAND="cbuild clean"
|
||||
DEP_DYNAMIC_OUT_FILES=""
|
||||
DEP_STATIC_OUT_FILES="bin/tim.a"
|
||||
DEP_OTHER_OUT_FILES=""
|
||||
PRESERVE_OUT_DIRECTORY_STRUCTURE=false
|
||||
2
dependencies/tlibc
vendored
2
dependencies/tlibc
vendored
Submodule dependencies/tlibc updated: ae0fa95d6a...82a6293f21
1
dependencies/tlibtoml
vendored
Submodule
1
dependencies/tlibtoml
vendored
Submodule
Submodule dependencies/tlibtoml added at 5cb121d1de
30
dependencies/tlibtoml.config
vendored
Normal file
30
dependencies/tlibtoml.config
vendored
Normal file
@@ -0,0 +1,30 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
# This is a dependency config.
|
||||
# You can copy it to another project to add tlibtoml dependency.
|
||||
|
||||
DEP_WORKING_DIR="$DEPENDENCIES_DIR/tlibtoml"
|
||||
|
||||
user_config_path="project.config.user"
|
||||
absolute_dep_dir=$(realpath "$DEPENDENCIES_DIR")
|
||||
|
||||
function setup_user_config(){
|
||||
# Set variable `DEPENDENCIES_DIR`` in `tlibtoml/project.config.user`
|
||||
# to the directory where `tlibc`` is installed
|
||||
file_copy_default_if_not_present "$user_config_path" "$user_config_path.default"
|
||||
replace_var_value_in_script "$user_config_path" "DEPENDENCIES_DIR" "$absolute_dep_dir"
|
||||
}
|
||||
|
||||
if [[ "$TASK" = *_dbg ]]; then
|
||||
dep_build_target="build_static_lib_dbg"
|
||||
else
|
||||
dep_build_target="build_static_lib"
|
||||
fi
|
||||
DEP_PRE_BUILD_COMMAND="setup_user_config"
|
||||
DEP_BUILD_COMMAND="cbuild $dep_build_target"
|
||||
DEP_POST_BUILD_COMMAND=""
|
||||
DEP_CLEAN_COMMAND="cbuild clean"
|
||||
DEP_DYNAMIC_OUT_FILES=""
|
||||
DEP_STATIC_OUT_FILES="bin/tlibtoml.a"
|
||||
DEP_OTHER_OUT_FILES=""
|
||||
PRESERVE_OUT_DIRECTORY_STRUCTURE=false
|
||||
1
dependencies/tsqlite
vendored
Submodule
1
dependencies/tsqlite
vendored
Submodule
Submodule dependencies/tsqlite added at 4b15db7c1f
30
dependencies/tsqlite.config
vendored
Normal file
30
dependencies/tsqlite.config
vendored
Normal file
@@ -0,0 +1,30 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
# This is a dependency config.
|
||||
# You can copy it to another project to add tsqlite dependency.
|
||||
|
||||
DEP_WORKING_DIR="$DEPENDENCIES_DIR/tsqlite"
|
||||
|
||||
user_config_path="project.config.user"
|
||||
absolute_dep_dir=$(realpath "$DEPENDENCIES_DIR")
|
||||
|
||||
function setup_user_config(){
|
||||
# Set variable `DEPENDENCIES_DIR`` in `tsqlite/project.config.user`
|
||||
# to the directory where `tlibc`` is installed
|
||||
file_copy_default_if_not_present "$user_config_path" "$user_config_path.default"
|
||||
replace_var_value_in_script "$user_config_path" "DEPENDENCIES_DIR" "$absolute_dep_dir"
|
||||
}
|
||||
|
||||
if [[ "$TASK" = *_dbg ]]; then
|
||||
dep_build_target="build_static_lib_dbg"
|
||||
else
|
||||
dep_build_target="build_static_lib"
|
||||
fi
|
||||
DEP_PRE_BUILD_COMMAND="setup_user_config"
|
||||
DEP_BUILD_COMMAND="cbuild $dep_build_target"
|
||||
DEP_POST_BUILD_COMMAND=""
|
||||
DEP_CLEAN_COMMAND="cbuild clean"
|
||||
DEP_DYNAMIC_OUT_FILES=""
|
||||
DEP_STATIC_OUT_FILES="bin/tsqlite.a"
|
||||
DEP_OTHER_OUT_FILES=""
|
||||
PRESERVE_OUT_DIRECTORY_STRUCTURE=false
|
||||
135
include/tcp-chat.h
Normal file
135
include/tcp-chat.h
Normal file
@@ -0,0 +1,135 @@
|
||||
#pragma once
|
||||
#include "tlibc/errors.h"
|
||||
#include "tlibc/time.h"
|
||||
#include "tlibc/magic.h"
|
||||
|
||||
/// requires tlibc and tlibtoml init
|
||||
Result(void) TcpChat_init();
|
||||
void TcpChat_deinit();
|
||||
|
||||
#define USERNAME_SIZE_MIN 2
|
||||
#define USERNAME_SIZE_MAX 31
|
||||
#define PASSWORD_SIZE_MIN 8
|
||||
#define PASSWORD_SIZE_MAX 31
|
||||
#define PASSWORD_HASH_SIZE 32
|
||||
#define HOSTADDR_SIZE_MIN 4
|
||||
#define HOSTADDR_SIZE_MAX 255
|
||||
#define PRIVATE_KEY_BASE64_SIZE_MAX 1724
|
||||
#define PUBLIC_KEY_BASE64_SIZE_MAX 699
|
||||
#define SERVER_NAME_SIZE_MIN 1
|
||||
#define SERVER_NAME_SIZE_MAX 127
|
||||
#define SERVER_DESC_SIZE_MAX 1023
|
||||
#define CHANNEL_NAME_SIZE_MIN 1
|
||||
#define CHANNEL_NAME_SIZE_MAX 127
|
||||
#define CHANNEL_DESC_SIZE_MAX 1023
|
||||
#define MESSAGE_SIZE_MIN 1
|
||||
#define MESSAGE_SIZE_MAX 4000
|
||||
#define MESSAGE_BLOCK_COUNT_MAX 50
|
||||
|
||||
#define MESSAGE_TIMESTAMP_FMT_SQL "%Y.%m.%d-%H:%M:%f"
|
||||
|
||||
//////////////////////////////////////////////////////////////////////////////
|
||||
// //
|
||||
// Logging //
|
||||
// //
|
||||
//////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
ErrorCodePage_declare(WINSOCK2);
|
||||
ErrorCodePage_declare(TcpChat);
|
||||
|
||||
typedef enum TcpChatError {
|
||||
TcpChatError_Unknown,
|
||||
TcpChatError_RejectIncoming,
|
||||
} TcpChatError;
|
||||
|
||||
typedef enum LogSeverity {
|
||||
LogSeverity_Debug,
|
||||
LogSeverity_Info,
|
||||
LogSeverity_Warn,
|
||||
LogSeverity_Error,
|
||||
} LogSeverity;
|
||||
|
||||
typedef void (*LogFunction_t)(void* logger, cstr context, LogSeverity severity, cstr msg);
|
||||
|
||||
// requires defined LOGGER, LOG_FUNC, LOG_CONTEXT
|
||||
#define log(severity, format, ...) { \
|
||||
if(LOG_FUNC) { \
|
||||
char* ___log_msg = sprintf_malloc(format ,##__VA_ARGS__); \
|
||||
LOG_FUNC(LOGGER, LOG_CONTEXT, severity, ___log_msg); \
|
||||
free(___log_msg); \
|
||||
} \
|
||||
}
|
||||
|
||||
#define logDebug(format, ...) log(LogSeverity_Debug, format ,##__VA_ARGS__)
|
||||
#define logInfo(format, ...) log(LogSeverity_Info, format ,##__VA_ARGS__)
|
||||
#define logWarn(format, ...) log(LogSeverity_Warn, format ,##__VA_ARGS__)
|
||||
#define logError(format, ...) log(LogSeverity_Error, format ,##__VA_ARGS__)
|
||||
|
||||
|
||||
//////////////////////////////////////////////////////////////////////////////
|
||||
// //
|
||||
// Server //
|
||||
// //
|
||||
//////////////////////////////////////////////////////////////////////////////
|
||||
typedef struct Server Server;
|
||||
|
||||
/// @param config_file_content config in toml format
|
||||
/// @param config_file_name to use in error messages
|
||||
/// @param logger some shared data for your log function
|
||||
/// @param log_func log function that you have to implement
|
||||
/// @return
|
||||
Result(Server*) Server_create(str config_file_content, cstr config_file_name,
|
||||
void* logger, LogFunction_t log_func);
|
||||
|
||||
void Server_free(Server* server);
|
||||
|
||||
Result(void) Server_run(Server* server);
|
||||
|
||||
|
||||
//////////////////////////////////////////////////////////////////////////////
|
||||
// //
|
||||
// Client //
|
||||
// //
|
||||
//////////////////////////////////////////////////////////////////////////////
|
||||
typedef struct Client Client;
|
||||
|
||||
Result(Client*) Client_create(str username, str password);
|
||||
void Client_free(Client* client);
|
||||
|
||||
/// @return username saved during client initialization
|
||||
str Client_getUserName(Client* client);
|
||||
|
||||
/// @return AES key calculated from password that can be used to encrypt user data
|
||||
Array(u8) Client_getUserDataKey(Client* client);
|
||||
|
||||
/// @param server_addr_cstr ip:port
|
||||
/// @param server_pk_base64 public key encoded by `RSA_serializePublicKey_base64()`
|
||||
Result(void) Client_connect(Client* client, cstr server_addr_cstr, cstr server_pk_base64);
|
||||
/// disconnect from current server
|
||||
void Client_disconnect(Client* client);
|
||||
|
||||
/// @param self connected client
|
||||
/// @param out_str heap-allocated string
|
||||
Result(void) Client_getServerName(Client* self, str* out_str);
|
||||
|
||||
/// @param self connected client
|
||||
/// @param out_str heap-allocated string
|
||||
Result(void) Client_getServerDescription(Client* self, str* out_str);
|
||||
|
||||
/// Create new account on connected server
|
||||
Result(void) Client_register(Client* self, i64* out_user_id);
|
||||
|
||||
/// Authorize on connected server
|
||||
Result(void) Client_login(Client* self, i64* out_user_id, i64* out_landing_channel_id);
|
||||
|
||||
/// @param out_timestamp timestamp received from server
|
||||
/// @return message id received from server
|
||||
Result(i64) Client_sendMessage(Client* self, i64 channel_id, Array(u8) content, DateTime* out_timestamp);
|
||||
|
||||
/// Receive a bunch of messages from the server to a client internal buffer
|
||||
/// @return number of messages received
|
||||
Result(u32) Client_receiveMessageBlock(Client* self, i64 channel_id, i64 first_message_id, u32 messages_count);
|
||||
|
||||
/// Read message saved in client internal buffer.
|
||||
/// @return number of bytes written in dst_content
|
||||
Result(u32) Client_popMessage(Client* self, Array(u8) dst_content, i64* message_id, i64* sender_id, DateTime* timestamp_utc);
|
||||
@@ -24,7 +24,7 @@ SRC_CPP="$(find src -name '*.cpp')"
|
||||
# See cbuild/example_dependency_configs
|
||||
DEPENDENCY_CONFIGS_DIR='dependencies'
|
||||
# List of dependency config files in DEPENDENCY_CONFIGS_DIR separated by space.
|
||||
ENABLED_DEPENDENCIES='tlibc bearssl'
|
||||
ENABLED_DEPENDENCIES='bearssl tlibc tlibtoml tsqlite tim'
|
||||
|
||||
# OBJDIR structure:
|
||||
# ├── objects/ - Compiled object files. Cleans on each call of build task
|
||||
@@ -35,7 +35,12 @@ OBJDIR="obj"
|
||||
OUTDIR="bin"
|
||||
STATIC_LIB_FILE="$PROJECT.a"
|
||||
|
||||
INCLUDE="-Isrc -I$DEPENDENCIES_DIR/BearSSL/inc -I$DEPENDENCIES_DIR/tlibc/include"
|
||||
INCLUDE="-Isrc -Iinclude
|
||||
-I$DEPENDENCIES_DIR/BearSSL/inc
|
||||
-I$DEPENDENCIES_DIR/tlibc/include
|
||||
-I$DEPENDENCIES_DIR/tlibtoml/include
|
||||
-I$DEPENDENCIES_DIR/tsqlite/include
|
||||
-I$DEPENDENCIES_DIR/tim/include"
|
||||
|
||||
# OS-specific options
|
||||
case "$OS" in
|
||||
@@ -43,13 +48,13 @@ case "$OS" in
|
||||
EXEC_FILE="$PROJECT.exe"
|
||||
SHARED_LIB_FILE="$PROJECT.dll"
|
||||
INCLUDE="$INCLUDE "
|
||||
LINKER_LIBS="-static -lpthread -lws2_32"
|
||||
LINKER_LIBS="-static -lpthread -lws2_32 -luuid -lsqlite3"
|
||||
;;
|
||||
LINUX)
|
||||
EXEC_FILE="$PROJECT"
|
||||
SHARED_LIB_FILE="$PROJECT.so"
|
||||
INCLUDE="$INCLUDE "
|
||||
LINKER_LIBS=""
|
||||
LINKER_LIBS="-lsqlite3"
|
||||
;;
|
||||
*)
|
||||
error "operating system $OS has no configuration variants"
|
||||
|
||||
66
src/cli/ClientCLI/ClientCLI.c
Normal file
66
src/cli/ClientCLI/ClientCLI.c
Normal file
@@ -0,0 +1,66 @@
|
||||
#include "ClientCLI.h"
|
||||
#include "tlibc/filesystem.h"
|
||||
#include "tlibc/term.h"
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
#include <assert.h>
|
||||
|
||||
void ClientCLI_destroy(ClientCLI* self){
|
||||
if(!self)
|
||||
return;
|
||||
|
||||
Client_free(self->client);
|
||||
ClientQueries_free(self->queries);
|
||||
tsqlite_connection_close(self->db);
|
||||
List_SavedServer_destroyWithElements(&self->saved_servers, SavedServer_destroy);
|
||||
}
|
||||
|
||||
void ClientCLI_construct(ClientCLI* self){
|
||||
zeroStruct(self);
|
||||
|
||||
self->style.common = (TimStyle){
|
||||
.brd = Color256_LightGray,
|
||||
.bg = Color256_NavyBlue,
|
||||
.fg = Color256_LightGray
|
||||
};
|
||||
self->style.focused = (TimStyle){
|
||||
.brd = Color256_White,
|
||||
.bg = Color256_DeepSkyBlue,
|
||||
.fg = Color256_White
|
||||
};
|
||||
self->style.error = (TimStyle){
|
||||
.brd = Color256_LightGray,
|
||||
.bg = Color256_DarkRed,
|
||||
.fg = Color256_White
|
||||
};
|
||||
|
||||
self->saved_servers = List_SavedServer_alloc(0);
|
||||
}
|
||||
|
||||
void ClientCLI_run(ClientCLI* self) {
|
||||
Deferral(32);
|
||||
|
||||
StartScreenContext start_screen_ctx;
|
||||
StartScreenContext_construct(&start_screen_ctx, self);
|
||||
Defer(StartScreenContext_destroy(&start_screen_ctx));
|
||||
MainScreenContext main_screen_ctx;
|
||||
MainScreenContext_construct(&main_screen_ctx, self);
|
||||
Defer(MainScreenContext_destroy(&main_screen_ctx));
|
||||
|
||||
while(tim_run(FPS)){
|
||||
switch(self->state){
|
||||
case ClientCLIState_Exit:
|
||||
Return;
|
||||
default:
|
||||
assert(false && "invalid ClientCLI state");
|
||||
break;
|
||||
case ClientCLIState_StartScreen:
|
||||
start_screen(&start_screen_ctx);
|
||||
break;
|
||||
case ClientCLIState_MainScreen:
|
||||
main_screen(&main_screen_ctx);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
Return;
|
||||
}
|
||||
95
src/cli/ClientCLI/ClientCLI.h
Normal file
95
src/cli/ClientCLI/ClientCLI.h
Normal file
@@ -0,0 +1,95 @@
|
||||
#pragma once
|
||||
#include <pthread.h>
|
||||
#include "tcp-chat.h"
|
||||
#include "tlibc/collections/HashMap.h"
|
||||
#include "tlibc/collections/List.h"
|
||||
#include "db/client_db.h"
|
||||
#include "tim.h"
|
||||
|
||||
#define FPS 30
|
||||
|
||||
typedef enum ClientCLIState {
|
||||
ClientCLIState_StartScreen,
|
||||
ClientCLIState_Exit,
|
||||
ClientCLIState_MainScreen,
|
||||
ClientCLIState_ServerChannels,
|
||||
ClientCLIState_ChannelChat,
|
||||
} ClientCLIState;
|
||||
|
||||
typedef struct ClientCLI {
|
||||
ClientCLIState state;
|
||||
struct {
|
||||
TimStyle common;
|
||||
TimStyle focused;
|
||||
TimStyle error;
|
||||
} style;
|
||||
Client* client;
|
||||
tsqlite_connection* db;
|
||||
ClientQueries* queries;
|
||||
List(SavedServer) saved_servers;
|
||||
} ClientCLI;
|
||||
|
||||
void ClientCLI_construct(ClientCLI* self);
|
||||
void ClientCLI_destroy(ClientCLI* self);
|
||||
void ClientCLI_run(ClientCLI* self);
|
||||
|
||||
|
||||
enum {
|
||||
Color256_Black = 0x10,
|
||||
Color256_MidGray = 0xf8,
|
||||
Color256_LightGray = 0xfb,
|
||||
Color256_White = 0xe7,
|
||||
Color256_NavyBlue = 0x11,
|
||||
Color256_DeepSkyBlue = 0x18,
|
||||
Color256_DarkRed = 0x58,
|
||||
};
|
||||
|
||||
typedef struct TextInputState {
|
||||
TimEditState edit;
|
||||
cstr label;
|
||||
struct {
|
||||
TimStyle common;
|
||||
TimStyle focused;
|
||||
} style;
|
||||
TimKey result_key;
|
||||
} TextInputState;
|
||||
|
||||
void TextInputState_construct(TextInputState* ctx, cstr label,
|
||||
Array(char) buf, NULLABLE(cstr) initial_value, bool masked,
|
||||
TimStyle common, TimStyle focused);
|
||||
|
||||
/// tim_edit with tim_label over its upper border.
|
||||
void text_input(TextInputState* ctx, i32 x, i32 y, i32 w, TimStyle style);
|
||||
|
||||
void TimPanelItem_fromTextInputState(TimPanelItem* item, TextInputState* input);
|
||||
|
||||
/// Intended to use in TimPanelItem
|
||||
/// @param data TextInputState*
|
||||
void draw_item_text_input(void* data, TimRect place, bool is_selected);
|
||||
|
||||
|
||||
List_declare(TimPanelItem);
|
||||
|
||||
typedef struct StartScreenContext {
|
||||
ClientCLI* client;
|
||||
char* err_msg; // heap only
|
||||
TextInputState input_username;
|
||||
TextInputState input_password;
|
||||
TimPanel central_panel;
|
||||
TimPanel central_buttons_panel;
|
||||
} StartScreenContext;
|
||||
|
||||
void StartScreenContext_construct(StartScreenContext* ctx, ClientCLI* client);
|
||||
void StartScreenContext_destroy(StartScreenContext* ctx);
|
||||
void start_screen(StartScreenContext* ctx);
|
||||
|
||||
|
||||
typedef struct MainScreenContext {
|
||||
ClientCLI* client;
|
||||
TimPanel central_panel;
|
||||
TimScrollView central_scroll_view;
|
||||
} MainScreenContext;
|
||||
|
||||
void MainScreenContext_construct(MainScreenContext* ctx, ClientCLI* client);
|
||||
void MainScreenContext_destroy(MainScreenContext* ctx);
|
||||
void main_screen(MainScreenContext* ctx);
|
||||
98
src/cli/ClientCLI/db/SavedServer.c
Normal file
98
src/cli/ClientCLI/db/SavedServer.c
Normal file
@@ -0,0 +1,98 @@
|
||||
#include "client_db_internal.h"
|
||||
|
||||
void SavedServer_destroy(SavedServer* self){
|
||||
if(!self)
|
||||
return;
|
||||
str_destroy(self->address);
|
||||
str_destroy(self->pk_base64);
|
||||
str_destroy(self->name);
|
||||
str_destroy(self->description);
|
||||
}
|
||||
|
||||
Result(bool) SavedServer_exists(ClientQueries* q, str address){
|
||||
Deferral(4);
|
||||
|
||||
tsqlite_statement* st = q->servers.exists;
|
||||
Defer(tsqlite_statement_reset(st));
|
||||
try_void(tsqlite_statement_bind_str(st, "$address", address, NULL));
|
||||
|
||||
try(bool has_result, i, tsqlite_statement_step(st));
|
||||
|
||||
Return RESULT_VALUE(i, has_result);
|
||||
}
|
||||
|
||||
Result(bool) SavedServer_comparePublicKey(ClientQueries* q, str address, str pk_base64){
|
||||
Deferral(4);
|
||||
|
||||
tsqlite_statement* st = q->servers.compare_pk;
|
||||
Defer(tsqlite_statement_reset(st));
|
||||
try_void(tsqlite_statement_bind_str(st, "$address", address, NULL));
|
||||
try_void(tsqlite_statement_bind_str(st, "$pk_base64", pk_base64, NULL));
|
||||
|
||||
try(bool has_result, i, tsqlite_statement_step(st));
|
||||
|
||||
Return RESULT_VALUE(i, has_result);
|
||||
}
|
||||
|
||||
Result(void) SavedServer_createOrUpdate(ClientQueries* q, SavedServer* server){
|
||||
Deferral(4);
|
||||
try_assert(server->address.len >= HOSTADDR_SIZE_MIN && server->address.len <= HOSTADDR_SIZE_MAX);
|
||||
try_assert(server->pk_base64.len > 0 && server->pk_base64.len <= PUBLIC_KEY_BASE64_SIZE_MAX);
|
||||
try_assert(server->name.len >= SERVER_NAME_SIZE_MIN && server->name.len <= SERVER_NAME_SIZE_MAX);
|
||||
try_assert(server->description.len <= SERVER_DESC_SIZE_MAX);
|
||||
|
||||
try(bool server_exists, i, SavedServer_exists(q, server->address));
|
||||
tsqlite_statement* st = NULL;
|
||||
Defer(tsqlite_statement_reset(st));
|
||||
if(server_exists){
|
||||
st = q->servers.update;
|
||||
try(bool pk_matches, i, SavedServer_comparePublicKey(q, server->address, server->pk_base64));
|
||||
if(!pk_matches){
|
||||
Return RESULT_ERROR_FMT(
|
||||
"trying to update server '"FMT_str"' but public keys don't match",
|
||||
str_unwrap(server->address));
|
||||
}
|
||||
}
|
||||
else {
|
||||
st = q->servers.insert;
|
||||
try_void(tsqlite_statement_bind_str(st, "$pk_base64", server->pk_base64, NULL));
|
||||
}
|
||||
try_void(tsqlite_statement_bind_str(st, "$address", server->address, NULL));
|
||||
try_void(tsqlite_statement_bind_str(st, "$name", server->name, NULL));
|
||||
try_void(tsqlite_statement_bind_str(st, "$description", server->description, NULL));
|
||||
try_void(tsqlite_statement_step(st));
|
||||
|
||||
Return RESULT_VALUE(i, !server_exists);
|
||||
}
|
||||
|
||||
Result(void) SavedServer_getAll(ClientQueries* q, List(SavedServer)* dst_list){
|
||||
Deferral(4);
|
||||
|
||||
tsqlite_statement* st = q->servers.get_all;
|
||||
Defer(tsqlite_statement_reset(st));
|
||||
|
||||
SavedServer server = SavedServer_construct(str_null, str_null, str_null, str_null);
|
||||
str tmp_str = str_null;
|
||||
while(true){
|
||||
try(bool has_result, i, tsqlite_statement_step(st));
|
||||
if(!has_result)
|
||||
break;
|
||||
|
||||
// address
|
||||
try_void(tsqlite_statement_getResult_str(st, &tmp_str));
|
||||
server.address = str_copy(tmp_str);
|
||||
// pk_base64
|
||||
try_void(tsqlite_statement_getResult_str(st, &tmp_str));
|
||||
server.pk_base64 = str_copy(tmp_str);
|
||||
// name
|
||||
try_void(tsqlite_statement_getResult_str(st, &tmp_str));
|
||||
server.name = str_copy(tmp_str);
|
||||
// description
|
||||
try_void(tsqlite_statement_getResult_str(st, &tmp_str));
|
||||
server.description = str_copy(tmp_str);
|
||||
|
||||
List_SavedServer_pushMany(dst_list, &server, 1);
|
||||
}
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
81
src/cli/ClientCLI/db/client_db.c
Normal file
81
src/cli/ClientCLI/db/client_db.c
Normal file
@@ -0,0 +1,81 @@
|
||||
#include "client_db_internal.h"
|
||||
#include "tlibc/filesystem.h"
|
||||
|
||||
Result(tsqlite_connection* db) ClientDatabase_open(cstr file_path){
|
||||
Deferral(64);
|
||||
|
||||
try_void(dir_createParent(file_path));
|
||||
try(tsqlite_connection* db, p, tsqlite_connection_open(file_path));
|
||||
bool success = false;
|
||||
Defer(if(!success) tsqlite_connection_close(db));
|
||||
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// SERVERS //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
try(tsqlite_statement* create_table_servers, p, tsqlite_statement_compile(db, STR(
|
||||
"CREATE TABLE IF NOT EXISTS servers (\n"
|
||||
" address VARCHAR PRIMARY KEY,\n"
|
||||
" pk_base64 VARCHAR NOT NULL,\n"
|
||||
" name VARCHAR NOT NULL,\n"
|
||||
" description VARCHAR NOT NULL\n"
|
||||
");"
|
||||
)));
|
||||
Defer(tsqlite_statement_free(create_table_servers));
|
||||
try_void(tsqlite_statement_step(create_table_servers));
|
||||
|
||||
success = true;
|
||||
Return RESULT_VALUE(p, db);
|
||||
}
|
||||
|
||||
|
||||
void ClientQueries_free(ClientQueries* q){
|
||||
if(!q)
|
||||
return;
|
||||
|
||||
tsqlite_statement_free(q->servers.insert);
|
||||
tsqlite_statement_free(q->servers.update);
|
||||
tsqlite_statement_free(q->servers.exists);
|
||||
tsqlite_statement_free(q->servers.compare_pk);
|
||||
tsqlite_statement_free(q->servers.get_all);
|
||||
|
||||
free(q);
|
||||
}
|
||||
|
||||
Result(ClientQueries*) ClientQueries_compile(tsqlite_connection* db){
|
||||
Deferral(4);
|
||||
|
||||
ClientQueries* q = (ClientQueries*)malloc(sizeof(*q));
|
||||
zeroStruct(q);
|
||||
bool success = false;
|
||||
Defer(if(!success) ClientQueries_free(q));
|
||||
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// SERVERS //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
try(q->servers.insert, p, tsqlite_statement_compile(db, STR(
|
||||
"INSERT INTO\n"
|
||||
"servers (address, pk_base64, name, description)\n"
|
||||
"VALUES ($address, $pk_base64, $name, $description);"
|
||||
)));
|
||||
|
||||
try(q->servers.update, p, tsqlite_statement_compile(db, STR(
|
||||
"UPDATE servers\n"
|
||||
"SET name = $name, description = $description\n"
|
||||
"WHERE address = $address;"
|
||||
)));
|
||||
|
||||
try(q->servers.exists, p, tsqlite_statement_compile(db, STR(
|
||||
"SELECT 1 FROM servers WHERE address = $address;"
|
||||
)));
|
||||
|
||||
try(q->servers.compare_pk, p, tsqlite_statement_compile(db, STR(
|
||||
"SELECT 1 FROM servers WHERE address = $address AND pk_base64 = $pk_base64;"
|
||||
)));
|
||||
|
||||
try(q->servers.get_all, p, tsqlite_statement_compile(db, STR(
|
||||
"SELECT * FROM servers;"
|
||||
)));
|
||||
|
||||
success = true;
|
||||
Return RESULT_VALUE(p, q);
|
||||
}
|
||||
38
src/cli/ClientCLI/db/client_db.h
Normal file
38
src/cli/ClientCLI/db/client_db.h
Normal file
@@ -0,0 +1,38 @@
|
||||
#pragma once
|
||||
#include "tcp-chat.h"
|
||||
#include "tsqlite.h"
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
#include "tlibc/collections/List.h"
|
||||
|
||||
/// @brief open DB and create tables
|
||||
Result(tsqlite_connection* db) ClientDatabase_open(cstr file_path);
|
||||
|
||||
typedef struct ClientQueries ClientQueries;
|
||||
Result(ClientQueries*) ClientQueries_compile(tsqlite_connection* db);
|
||||
void ClientQueries_free(ClientQueries* self);
|
||||
|
||||
|
||||
typedef struct SavedServer {
|
||||
str address;
|
||||
str pk_base64;
|
||||
str name;
|
||||
str description;
|
||||
} SavedServer;
|
||||
|
||||
List_declare(SavedServer);
|
||||
|
||||
#define SavedServer_construct(ADDR, PK, NAME, DESC) ((SavedServer){ \
|
||||
.address = ADDR, .pk_base64 = PK, .name = NAME, .description = DESC })
|
||||
|
||||
void SavedServer_destroy(SavedServer* self);
|
||||
|
||||
/// @return true if new row was created
|
||||
Result(bool) SavedServer_createOrUpdate(ClientQueries* q, SavedServer* server);
|
||||
|
||||
/// @param dst_list there SavedServer values are pushed
|
||||
Result(void) SavedServer_getAll(ClientQueries* q, List(SavedServer)* dst_list);
|
||||
|
||||
Result(bool) SavedServer_exists(ClientQueries* q, str address);
|
||||
|
||||
/// @return true if provided key and saved key match
|
||||
Result(bool) SavedServer_comparePublicKey(ClientQueries* q, str address, str pk_base64);
|
||||
17
src/cli/ClientCLI/db/client_db_internal.h
Normal file
17
src/cli/ClientCLI/db/client_db_internal.h
Normal file
@@ -0,0 +1,17 @@
|
||||
#pragma once
|
||||
#include "client_db.h"
|
||||
|
||||
typedef struct ClientQueries {
|
||||
struct {
|
||||
/* ($address, $pk_base64, $name, $description) -> void */
|
||||
tsqlite_statement* insert;
|
||||
/* ($address, $name, $description) -> void */
|
||||
tsqlite_statement* update;
|
||||
/* ($address) -> 1 or nothing */
|
||||
tsqlite_statement* exists;
|
||||
/* ($address, $pk_base64) -> 1 or nothing */
|
||||
tsqlite_statement* compare_pk;
|
||||
/* () -> [(*)] */
|
||||
tsqlite_statement* get_all;
|
||||
} servers;
|
||||
} ClientQueries;
|
||||
302
src/cli/ClientCLI/main_screen.c
Normal file
302
src/cli/ClientCLI/main_screen.c
Normal file
@@ -0,0 +1,302 @@
|
||||
#include "ClientCLI.h"
|
||||
#include "tlibc/term.h"
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
#include "tim.h"
|
||||
|
||||
|
||||
static const str greeting_art = STR(
|
||||
" ^,,^ ╱|\n"
|
||||
" ( •·•) Meum! (o.o`7\n"
|
||||
" / ` | Meum... |`˜ \\\n"
|
||||
"\\(_,J J L l`,)/\n"
|
||||
);
|
||||
|
||||
static const str farewell_art = STR(
|
||||
" ^,,^ ╱|\n"
|
||||
" ( -.-) (>,<`7\n"
|
||||
" / ` | Goodbye! |`˜ \\\n"
|
||||
"\\(_,J J L l`,)/\n"
|
||||
);
|
||||
|
||||
|
||||
static void draw_test_label(void* data, TimRect place, bool is_selected);
|
||||
static void draw_central_panel(void* data, TimRect place);
|
||||
static Result(SavedServer*) joinNewServer(ClientCLI* self);
|
||||
static Result(SavedServer*) selectServerFromCache(ClientCLI* self);
|
||||
static Result(void) showSavedServer(ClientCLI* self, SavedServer* server);
|
||||
static Result(void) registerAtServer(ClientCLI* self);
|
||||
static Result(void) loginAtServer(ClientCLI* self);
|
||||
|
||||
|
||||
void MainScreenContext_construct(MainScreenContext* ctx, ClientCLI* client){
|
||||
zeroStruct(ctx);
|
||||
ctx->client = client;
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// central_panel //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
{
|
||||
List(TimPanelItem) items = List_TimPanelItem_alloc(4);
|
||||
|
||||
TimPanelItem item_test_label = {
|
||||
.w = A, .h = 12, .data = ctx, .draw = draw_test_label
|
||||
};
|
||||
List_TimPanelItem_push(&items, item_test_label);
|
||||
List_TimPanelItem_push(&items, item_test_label);
|
||||
List_TimPanelItem_push(&items, item_test_label);
|
||||
List_TimPanelItem_push(&items, item_test_label);
|
||||
|
||||
ctx->central_panel.items = items.data;
|
||||
ctx->central_panel.len = items.len;
|
||||
}
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// central_scroll_view //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
{
|
||||
ctx->central_scroll_view.content_h = 50;
|
||||
ctx->central_scroll_view.data = ctx;
|
||||
ctx->central_scroll_view.draw = draw_central_panel;
|
||||
}
|
||||
}
|
||||
|
||||
void MainScreenContext_destroy(MainScreenContext* ctx){
|
||||
free(ctx->central_panel.items);
|
||||
}
|
||||
|
||||
void main_screen(MainScreenContext* ctx){
|
||||
if (tim->event.type == TimEvent_Draw) {
|
||||
tim_fill(tim_cell(" ", ctx->client->style.common.fg, ctx->client->style.common.bg), 0, 0, A, A);
|
||||
}
|
||||
|
||||
if(tim_button_noborder("[Esc/Q] Exit", 1, 0, 14, 1, ctx->client->style.common)
|
||||
|| tim_is_key_press('q')
|
||||
|| tim_is_key_press(TimKey_Escape))
|
||||
{
|
||||
ctx->client->state = ClientCLIState_Exit;
|
||||
}
|
||||
|
||||
tim_scroll_view(&ctx->central_scroll_view, 0, 1, ~0, ~0, ctx->client->style.common);
|
||||
}
|
||||
|
||||
static void draw_test_label(void* data, TimRect place, bool is_selected){
|
||||
MainScreenContext* ctx = data;
|
||||
TimStyle style = is_selected ? ctx->client->style.focused : ctx->client->style.common;
|
||||
tim_frame(place.x, place.y, place.w, place.h, style);
|
||||
tim_label("0\n1\n2\n3\n4\n5\n6\n7\n8\n9",
|
||||
place.x + 1, place.y + 1, place.w - 2, place.h - 2, style);
|
||||
}
|
||||
|
||||
static void draw_central_panel(void* data, TimRect place){
|
||||
MainScreenContext* ctx = data;
|
||||
tim_panel(&ctx->central_panel, false, place.x, place.y, place.w, place.h);
|
||||
}
|
||||
|
||||
/*
|
||||
static Result(void) ClientCLI_execCommand(ClientCLI* self, str command, bool* stop){
|
||||
Deferral(64);
|
||||
|
||||
if(is_alias("q") || is_alias("quit") || is_alias("exit")){
|
||||
printf(FMT_str"\n", farewell_art.len, farewell_art.data);
|
||||
*stop = true;
|
||||
}
|
||||
else if(is_alias("clear")){
|
||||
term_clear();
|
||||
}
|
||||
else if(is_alias("h") || is_alias("help")){
|
||||
printf(
|
||||
"COMMANDS:\n"
|
||||
"Without connection:\n"
|
||||
" h, help Show this message.\n"
|
||||
" q, quit, exit Close the program.\n"
|
||||
" clear Clear the screen.\n"
|
||||
"Connection:\n"
|
||||
" j, join Join a new server and select it.\n"
|
||||
" s, select Select a server you joined before.\n"
|
||||
"After connection:\n"
|
||||
" r, register Create account on selected server\n"
|
||||
" l, login Authorize on selected server\n"
|
||||
"Authorized:\n"
|
||||
);
|
||||
}
|
||||
else if (is_alias("j") || is_alias("join")){
|
||||
// ask address and key, connect to server
|
||||
try_void(joinNewServer(self));
|
||||
}
|
||||
else if(is_alias("s") || is_alias("select")){
|
||||
// show scrollable list of servers, get selected one
|
||||
try_void(selectServerFromCache(self));
|
||||
}
|
||||
else if(is_alias("r") || is_alias("register")){
|
||||
try_void(registerAtServer(self));
|
||||
}
|
||||
else if(is_alias("l") || is_alias("login")){
|
||||
try_void(loginAtServer(self));
|
||||
// TODO: call Client_runIO():
|
||||
// function with infinite loop which sends and receives messages
|
||||
// with navigation across server channels
|
||||
}
|
||||
else {
|
||||
printf("ERROR: unknown command.\n"
|
||||
"Use 'h' to see list of avaliable commands\n");
|
||||
}
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
*/
|
||||
|
||||
static Result(void) joinNewServer(ClientCLI* self){
|
||||
Deferral(8);
|
||||
bool success = false;
|
||||
|
||||
// ask server address
|
||||
const u32 address_alloc_size = HOSTADDR_SIZE_MAX + 1;
|
||||
str address = str_construct((char*)malloc(address_alloc_size), address_alloc_size, true);
|
||||
Defer(if(!success) str_destroy(address));
|
||||
printf("Enter server address (ip:port):\n");
|
||||
try_void(term_readLine(address.data, address.len));
|
||||
address.len = strlen(address.data);
|
||||
str_trim(&address, true);
|
||||
|
||||
// ask server public key
|
||||
const u32 server_pk_alloc_size = PUBLIC_KEY_BASE64_SIZE_MAX + 1;
|
||||
str server_pk = str_construct((char*)malloc(server_pk_alloc_size), server_pk_alloc_size, true);
|
||||
Defer(if(!success) str_destroy(server_pk));
|
||||
printf("Enter server public key (RSA-Public-<SIZE>:<DATA>):\n");
|
||||
try_void(term_readLine(server_pk.data, server_pk.len));
|
||||
server_pk.len = strlen(server_pk.data);
|
||||
str_trim(&server_pk, true);
|
||||
|
||||
printf("Connecting to server...\n");
|
||||
try_void(Client_connect(self->client, address.data, server_pk.data));
|
||||
printf("Connection established\n");
|
||||
|
||||
str server_name = str_null;
|
||||
try_void(Client_getServerName(self->client, &server_name));
|
||||
Defer(if(!success) str_destroy(server_name));
|
||||
str server_description = str_null;
|
||||
try_void(Client_getServerDescription(self->client, &server_description));
|
||||
Defer(if(!success) str_destroy(server_description));
|
||||
|
||||
SavedServer server = SavedServer_construct(
|
||||
address,
|
||||
server_pk,
|
||||
server_name,
|
||||
server_description
|
||||
);
|
||||
try_void(SavedServer_createOrUpdate(self->queries, &server));
|
||||
List_SavedServer_pushMany(&self->saved_servers, &server, 1);
|
||||
|
||||
try_void(showSavedServer(self, &server));
|
||||
|
||||
success = true;
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
static Result(void) selectServerFromCache(ClientCLI* self){
|
||||
Deferral(8);
|
||||
bool success = false;
|
||||
|
||||
u32 servers_count = self->saved_servers.len;
|
||||
if(servers_count == 0){
|
||||
printf("No saved servers found\n");
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
for(u32 i = 0; i < servers_count; i++){
|
||||
SavedServer* server = &self->saved_servers.data[i];
|
||||
printf("[%02u] "FMT_str" "FMT_str"\n",
|
||||
i, str_unwrap(server->address), str_unwrap(server->name));
|
||||
}
|
||||
|
||||
char buf[32];
|
||||
u32 selected_i = -1;
|
||||
while(true) {
|
||||
printf("Type 'q' to cancel\n");
|
||||
printf("Select server number: ");
|
||||
try_void(term_readLine(buf, sizeof(buf)));
|
||||
str input_line = str_from_cstr(buf);
|
||||
str_trim(&input_line, true);
|
||||
if(str_equals(input_line, STR("q"))){
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
if(sscanf(buf, FMT_u32, &selected_i) != 1){
|
||||
printf("ERROR: not a number\n");
|
||||
}
|
||||
else if(selected_i >= servers_count){
|
||||
printf("ERROR: not a server number\n");
|
||||
}
|
||||
else break;
|
||||
}
|
||||
SavedServer* selected_server = &self->saved_servers.data[selected_i];
|
||||
|
||||
printf("Connecting to '"FMT_str"'...\n", str_unwrap(selected_server->address));
|
||||
try_void(Client_connect(self->client, selected_server->address.data, selected_server->pk_base64.data));
|
||||
printf("Connection established\n");
|
||||
|
||||
// update server name
|
||||
bool server_info_changed = false;
|
||||
str updated_server_name = str_null;
|
||||
try_void(Client_getServerName(self->client, &updated_server_name));
|
||||
Defer(if(!success) str_destroy(updated_server_name));
|
||||
if(!str_equals(updated_server_name, selected_server->name)){
|
||||
server_info_changed = true;
|
||||
selected_server->name = updated_server_name;
|
||||
}
|
||||
|
||||
// update server description
|
||||
str updated_server_description = str_null;
|
||||
try_void(Client_getServerDescription(self->client, &updated_server_description));
|
||||
Defer(if(!success) str_destroy(updated_server_description));
|
||||
if(!str_equals(updated_server_description, selected_server->description)){
|
||||
server_info_changed = true;
|
||||
selected_server->description = updated_server_description;
|
||||
}
|
||||
|
||||
if(server_info_changed){
|
||||
try_void(SavedServer_createOrUpdate(self->queries, selected_server));
|
||||
}
|
||||
|
||||
try_void(showSavedServer(self, selected_server));
|
||||
|
||||
success = true;
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
static Result(void) showSavedServer(ClientCLI* self, SavedServer* server){
|
||||
Deferral(8);
|
||||
(void)self;
|
||||
|
||||
printf("Server Name: "FMT_str"\n", str_unwrap(server->name));
|
||||
printf("Host Address: "FMT_str"\n", str_unwrap(server->address));
|
||||
printf("Description:\n"FMT_str"\n\n", str_unwrap(server->description));
|
||||
printf("Public Key:\n" FMT_str"\n\n", str_unwrap(server->pk_base64));
|
||||
printf("Type 'register' if you don't have an account on the server.\n");
|
||||
printf("Type 'login' to authorize on the server.\n");
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
static Result(void) registerAtServer(ClientCLI* self){
|
||||
Deferral(8);
|
||||
|
||||
i64 user_id = 0;
|
||||
try_void(Client_register(self->client, &user_id));
|
||||
printf("Registered successfully\n");
|
||||
printf("user_id: "FMT_i64"\n", user_id);
|
||||
try_assert(user_id > 0);
|
||||
// TODO: use user_id somewhere
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
static Result(void) loginAtServer(ClientCLI* self){
|
||||
Deferral(8);
|
||||
|
||||
i64 user_id = 0, landing_channel_id = 0;
|
||||
try_void(Client_login(self->client, &user_id, &landing_channel_id));
|
||||
printf("Authorized successfully\n");
|
||||
printf("user_id: "FMT_i64", landing_channel_id: "FMT_i64"\n", user_id, landing_channel_id);
|
||||
try_assert(user_id > 0);
|
||||
// TODO: use user_id, landing_channel_id somewhere
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
195
src/cli/ClientCLI/start_screen.c
Normal file
195
src/cli/ClientCLI/start_screen.c
Normal file
@@ -0,0 +1,195 @@
|
||||
#include "ClientCLI.h"
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
#include "tlibc/filesystem.h"
|
||||
|
||||
static void draw_central_buttons_panel(void* data, TimRect place, bool is_selected);
|
||||
static void draw_start_button(void* data, TimRect place, bool is_selected);
|
||||
static void draw_exit_button(void* data, TimRect place, bool is_selected);
|
||||
static Result(void) openUserDB(StartScreenContext* ctx);
|
||||
|
||||
|
||||
#define handleError(R) _handleError(ctx, R)
|
||||
static void _handleError(StartScreenContext* ctx, ResultVar(void) r){
|
||||
free(ctx->err_msg);
|
||||
ctx->err_msg = Error_toStr(r.error).data;
|
||||
Error_free(r.error);
|
||||
}
|
||||
|
||||
static void clearError(StartScreenContext* ctx){
|
||||
free(ctx->err_msg);
|
||||
ctx->err_msg = NULL;
|
||||
}
|
||||
|
||||
void StartScreenContext_construct(StartScreenContext* ctx, ClientCLI* client){
|
||||
zeroStruct(ctx);
|
||||
ctx->client = client;
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// input_username //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
{
|
||||
Array(char) username_buf = Array_char_alloc(USERNAME_SIZE_MAX + 1);
|
||||
TextInputState_construct(&ctx->input_username, "[username]",
|
||||
username_buf, NULL, false,
|
||||
ctx->client->style.common, ctx->client->style.focused);
|
||||
}
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// input_password //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
{
|
||||
Array(char) password_buf = Array_char_alloc(PASSWORD_SIZE_MAX + 1);
|
||||
TextInputState_construct(&ctx->input_password, "[password]",
|
||||
password_buf, NULL, true,
|
||||
ctx->client->style.common, ctx->client->style.focused);
|
||||
}
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// central_panel //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
{
|
||||
List(TimPanelItem) items = List_TimPanelItem_alloc(4);
|
||||
|
||||
TimPanelItem item_username_input;
|
||||
TimPanelItem_fromTextInputState(&item_username_input, &ctx->input_username);
|
||||
List_TimPanelItem_push(&items, item_username_input);
|
||||
|
||||
TimPanelItem item_password_input;
|
||||
TimPanelItem_fromTextInputState(&item_password_input, &ctx->input_password);
|
||||
List_TimPanelItem_push(&items, item_password_input);
|
||||
|
||||
TimPanelItem item_central_buttons_panel = {
|
||||
.w = A, .h = 3, .data = ctx, .draw = draw_central_buttons_panel
|
||||
};
|
||||
List_TimPanelItem_push(&items, item_central_buttons_panel);
|
||||
|
||||
ctx->central_panel.items = items.data;
|
||||
ctx->central_panel.len = items.len;
|
||||
}
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// central_buttons_panel //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
{
|
||||
List(TimPanelItem) items = List_TimPanelItem_alloc(4);
|
||||
|
||||
TimPanelItem item_start_button = {
|
||||
.w = A, .h = 3, .data = ctx, .draw = draw_start_button
|
||||
};
|
||||
List_TimPanelItem_push(&items, item_start_button);
|
||||
|
||||
TimPanelItem item_exit_button = {
|
||||
.w = A, .h = 3, .data = ctx, .draw = draw_exit_button
|
||||
};
|
||||
List_TimPanelItem_push(&items, item_exit_button);
|
||||
|
||||
ctx->central_buttons_panel.items = items.data;
|
||||
ctx->central_buttons_panel.len = items.len;
|
||||
ctx->central_buttons_panel.is_horizontal = true;
|
||||
}
|
||||
}
|
||||
|
||||
void StartScreenContext_destroy(StartScreenContext* ctx){
|
||||
free(ctx->input_username.edit.s);
|
||||
free(ctx->input_password.edit.s);
|
||||
free(ctx->err_msg);
|
||||
free(ctx->central_panel.items);
|
||||
free(ctx->central_buttons_panel.items);
|
||||
}
|
||||
|
||||
void start_screen(StartScreenContext* ctx)
|
||||
{
|
||||
if (tim->event.type == TimEvent_Draw) {
|
||||
tim_fill(tim_cell(" ", ctx->client->style.common.fg, ctx->client->style.common.bg), 0, 0, A, A);
|
||||
}
|
||||
|
||||
tim_frame(A, A, 40, 11, ctx->client->style.common);
|
||||
tim_panel(&ctx->central_panel, true, A, A, 38, 9);
|
||||
|
||||
if(ctx->err_msg){
|
||||
i32 below_list = tim->scopes[tim->scope].h/2 + 6;
|
||||
tim_label("ERROR: ", A, below_list, A, A, ctx->client->style.error);
|
||||
tim_label(ctx->err_msg, A, below_list + 1, A, A, ctx->client->style.error);
|
||||
}
|
||||
}
|
||||
|
||||
static void draw_central_buttons_panel(void* data, TimRect place, bool is_selected){
|
||||
StartScreenContext* ctx = data;
|
||||
tim_panel(&ctx->central_buttons_panel, is_selected, place.x, place.y, place.w, place.h);
|
||||
}
|
||||
|
||||
static void draw_start_button(void* data, TimRect place, bool is_selected){
|
||||
StartScreenContext* ctx = data;
|
||||
TimStyle style = is_selected ? ctx->client->style.focused : ctx->client->style.common;
|
||||
if(tim_button("[Enter] Start", place.x, place.y, place.w, A, style)
|
||||
|| tim_is_key_press(TimKey_Enter))
|
||||
{
|
||||
clearError(ctx);
|
||||
|
||||
// check username
|
||||
str username = str_from_cstr(ctx->input_username.edit.s);
|
||||
str_trim(&username, true);
|
||||
str name_error_str = validateUsername_str(username);
|
||||
if(name_error_str.data){
|
||||
ctx->err_msg = name_error_str.data;
|
||||
return;
|
||||
}
|
||||
|
||||
// check password
|
||||
str password = str_from_cstr(ctx->input_password.edit.s);
|
||||
str_trim(&password, true);
|
||||
if(password.len < PASSWORD_SIZE_MIN || password.len > PASSWORD_SIZE_MAX){
|
||||
ctx->err_msg = sprintf_malloc(
|
||||
"password length (in bytes) must be >= %i and <= %i",
|
||||
PASSWORD_SIZE_MIN, PASSWORD_SIZE_MAX
|
||||
);
|
||||
return;
|
||||
}
|
||||
|
||||
// create client
|
||||
try_handle(ctx->client->client, p, Client_create(username, password), handleError);
|
||||
// init user DB
|
||||
try_handle_void(openUserDB(ctx), handleError);
|
||||
// erase password from memory
|
||||
memset(ctx->input_password.edit.s, 0, ctx->input_password.edit.capacity);
|
||||
// switch to next screen
|
||||
ctx->client->state = ClientCLIState_MainScreen;
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
||||
static void draw_exit_button(void* data, TimRect place, bool is_selected){
|
||||
StartScreenContext* ctx = data;
|
||||
TimStyle style = is_selected ? ctx->client->style.focused : ctx->client->style.common;
|
||||
if(tim_button("[Esc/Q] Exit", place.x, place.y, place.w, A, style)
|
||||
|| tim_is_key_press('q')
|
||||
|| tim_is_key_press(TimKey_Escape)
|
||||
|| ctx->input_username.result_key == TimKey_Escape
|
||||
|| ctx->input_password.result_key == TimKey_Escape)
|
||||
{
|
||||
ctx->client->state = ClientCLIState_Exit;
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
||||
static Result(void) openUserDB(StartScreenContext* ctx){
|
||||
Deferral(8);
|
||||
|
||||
str username = Client_getUserName(ctx->client->client);
|
||||
// TODO: encrypt user database
|
||||
// Array(u8) user_data_key = Client_getUserDataKey(ctx->client->client);
|
||||
|
||||
// build database file path
|
||||
try(char* user_dir, p, path_getUserDir());
|
||||
Defer(free(user_dir));
|
||||
char* db_path = strcat_malloc(
|
||||
user_dir,
|
||||
path_seps".local"path_seps"tcp-chat-client"path_seps"user-db"path_seps,
|
||||
username.data, ".sqlite"
|
||||
);
|
||||
Defer(free(db_path));
|
||||
|
||||
try(ctx->client->db, p, ClientDatabase_open(db_path));
|
||||
try(ctx->client->queries, p, ClientQueries_compile(ctx->client->db));
|
||||
|
||||
// load whole servers table to list
|
||||
try_void(SavedServer_getAll(ctx->client->queries, &ctx->client->saved_servers));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
32
src/cli/ClientCLI/widgets.c
Normal file
32
src/cli/ClientCLI/widgets.c
Normal file
@@ -0,0 +1,32 @@
|
||||
#include "ClientCLI.h"
|
||||
|
||||
void TextInputState_construct(TextInputState* ctx, cstr label,
|
||||
Array(char) buf, NULLABLE(cstr) initial_value, bool masked,
|
||||
TimStyle common, TimStyle focused)
|
||||
{
|
||||
TimEditState_construct(&ctx->edit, buf.data, buf.len, initial_value);
|
||||
ctx->edit.masked = masked;
|
||||
ctx->label = label;
|
||||
ctx->style.common = common;
|
||||
ctx->style.focused = focused;
|
||||
}
|
||||
|
||||
void text_input(TextInputState* ctx, i32 x, i32 y, i32 w, TimStyle style){
|
||||
ctx->result_key = tim_edit(&ctx->edit, x, y, w, style);
|
||||
tim_label(ctx->label, x + 3, y, A, 1, style);
|
||||
}
|
||||
|
||||
void TimPanelItem_fromTextInputState(TimPanelItem* item, TextInputState* input){
|
||||
zeroStruct(item);
|
||||
item->w = A;
|
||||
item->h = 3;
|
||||
item->data = input;
|
||||
item->focus_target = &input->edit;
|
||||
item->draw = draw_item_text_input;
|
||||
}
|
||||
|
||||
void draw_item_text_input(void* data, TimRect place, bool is_selected){
|
||||
TextInputState* ctx = data;
|
||||
TimStyle style = is_selected ? ctx->style.focused : ctx->style.common;
|
||||
text_input(ctx, place.x, place.y, place.w, style);
|
||||
}
|
||||
161
src/cli/main.c
Normal file
161
src/cli/main.c
Normal file
@@ -0,0 +1,161 @@
|
||||
#include "tcp-chat.h"
|
||||
#include "tlibc/tlibc.h"
|
||||
#include "tlibtoml.h"
|
||||
#include "cryptography/RSA.h"
|
||||
#include "cli/modes/modes.h"
|
||||
|
||||
#define _DEFAULT_CONFIG_PATH_CLIENT "tcp-chat-client.config"
|
||||
#define _DEFAULT_CONFIG_PATH_SERVER "tcp-chat-server.toml"
|
||||
|
||||
#define arg_is(LITERAL) str_equals(arg_str, STR(LITERAL))
|
||||
|
||||
|
||||
int main(const int argc, cstr const* argv){
|
||||
Deferral(32);
|
||||
try_fatal_void(tlibc_init());
|
||||
Defer(tlibc_deinit());
|
||||
try_fatal_void(tlibtoml_init());
|
||||
Defer(tlibtoml_deinit());
|
||||
try_fatal_void(TcpChat_init());
|
||||
Defer(TcpChat_deinit());
|
||||
|
||||
if(br_prng_seeder_system(NULL) == NULL){
|
||||
printfe("Can't get system random seeder. Bearssl is compiled incorrectly.");
|
||||
return 1;
|
||||
}
|
||||
|
||||
ProgramMode mode = ClientMode;
|
||||
cstr config_path = NULL;
|
||||
u32 size_arg = 0;
|
||||
|
||||
for(int argi = 1; argi < argc; argi++){
|
||||
str arg_str = str_from_cstr(argv[argi]);
|
||||
if(arg_is("-h") || arg_is("--help")){
|
||||
printf(
|
||||
"USAGE:\n"
|
||||
"no arguments Interactive client mode.\n"
|
||||
"-h, --help Show this message.\n"
|
||||
"-l, --listen Start server.\n"
|
||||
"--config [path] Load config from specified path.\n"
|
||||
" Default path for config is '" _DEFAULT_CONFIG_PATH_CLIENT "' or '" _DEFAULT_CONFIG_PATH_SERVER "'\n"
|
||||
"--rsa-gen-stdin [size] Generate RSA private and public keys based on stdin data (64Kb max).\n"
|
||||
" size: 2048 / 3072 (default) / 4096\n"
|
||||
" Usage: `cat somefile | tcp-chat --gen-rsa-stdin`\n"
|
||||
"--rsa-gen-random [size] Generate random RSA private and public keys.\n"
|
||||
" size: 2048 / 3072 (default) / 4096\n"
|
||||
"--random-bytes [size] Generate random bytes.\n"
|
||||
" size: any number (default=32)\n"
|
||||
"--random-bytes-base64 [size] Generate random bytes and print them in base64 encoding.\n"
|
||||
" size: any number (default=32)\n"
|
||||
);
|
||||
Return 0;
|
||||
}
|
||||
if(arg_is("-l") || arg_is("--listen")){
|
||||
if(mode != ClientMode){
|
||||
printf("program mode is set already\n");
|
||||
Return 1;
|
||||
}
|
||||
mode = ServerMode;
|
||||
}
|
||||
else if(arg_is("--config")){
|
||||
if(++argi >= argc){
|
||||
printfe("ERROR: no config path specified\n");
|
||||
Return 1;
|
||||
}
|
||||
config_path = argv[argi];
|
||||
}
|
||||
else if(arg_is("--rsa-gen-stdin")){
|
||||
if(mode != ClientMode){
|
||||
printf("program mode is set already\n");
|
||||
Return 1;
|
||||
}
|
||||
|
||||
mode = RsaGenStdin;
|
||||
if(++argi >= argc){
|
||||
size_arg = RSA_DEFAULT_KEY_SIZE;
|
||||
}
|
||||
else if(sscanf(argv[argi], "%u", &size_arg) != 1){
|
||||
printfe("ERROR: no key size specified\n");
|
||||
}
|
||||
}
|
||||
|
||||
else if(arg_is("--rsa-gen-random")){
|
||||
if(mode != ClientMode){
|
||||
printf("program mode is set already\n");
|
||||
Return 1;
|
||||
}
|
||||
|
||||
mode = RsaGenRandom;
|
||||
if(++argi >= argc){
|
||||
size_arg = RSA_DEFAULT_KEY_SIZE;
|
||||
}
|
||||
else if(sscanf(argv[argi], "%u", &size_arg) != 1){
|
||||
printfe("ERROR: no key size specified\n");
|
||||
}
|
||||
}
|
||||
else if(arg_is("--random-bytes")){
|
||||
if(mode != ClientMode){
|
||||
printf("program mode is set already\n");
|
||||
Return 1;
|
||||
}
|
||||
|
||||
mode = RandomBytes;
|
||||
if(++argi >= argc){
|
||||
size_arg = 32;
|
||||
}
|
||||
else if(sscanf(argv[argi], "%u", &size_arg) != 1){
|
||||
printfe("ERROR: no size specified\n");
|
||||
}
|
||||
}
|
||||
else if(arg_is("--random-bytes-base64")){
|
||||
if(mode != ClientMode){
|
||||
printf("program mode is set already\n");
|
||||
Return 1;
|
||||
}
|
||||
|
||||
mode = RandomBytesBase64;
|
||||
if(++argi >= argc){
|
||||
size_arg = 32;
|
||||
}
|
||||
else if(sscanf(argv[argi], "%u", &size_arg) != 1){
|
||||
printfe("ERROR: no size specified\n");
|
||||
}
|
||||
}
|
||||
else {
|
||||
printfe("ERROR: unknown argument '%s'\n"
|
||||
"Use '-h' to see list of avaliable arguments\n",
|
||||
argv[argi]);
|
||||
Return 1;
|
||||
}
|
||||
}
|
||||
|
||||
switch(mode){
|
||||
default:
|
||||
printfe("ERROR: invalid program mode %i\n", mode);
|
||||
Return 1;
|
||||
case ClientMode:
|
||||
if(!config_path)
|
||||
config_path = _DEFAULT_CONFIG_PATH_CLIENT;
|
||||
try_fatal_void(run_ClientMode(config_path));
|
||||
break;
|
||||
case ServerMode:
|
||||
if(!config_path)
|
||||
config_path = _DEFAULT_CONFIG_PATH_SERVER;
|
||||
try_fatal_void(run_ServerMode(config_path));
|
||||
break;
|
||||
case RsaGenStdin:
|
||||
try_fatal_void(run_RsaGenStdin(size_arg));
|
||||
break;
|
||||
case RsaGenRandom:
|
||||
try_fatal_void(run_RsaGenRandom(size_arg));
|
||||
break;
|
||||
case RandomBytes:
|
||||
try_fatal_void(run_RandomBytes(size_arg));
|
||||
break;
|
||||
case RandomBytesBase64:
|
||||
try_fatal_void(run_RandomBytesBase64(size_arg));
|
||||
break;
|
||||
}
|
||||
|
||||
Return 0;
|
||||
}
|
||||
15
src/cli/modes/ClientMode.c
Normal file
15
src/cli/modes/ClientMode.c
Normal file
@@ -0,0 +1,15 @@
|
||||
#include "modes.h"
|
||||
#include "cli/ClientCLI/ClientCLI.h"
|
||||
|
||||
Result(void) run_ClientMode(cstr config_path) {
|
||||
Deferral(4);
|
||||
(void)config_path;
|
||||
|
||||
ClientCLI client;
|
||||
ClientCLI_construct(&client);
|
||||
Defer(ClientCLI_destroy(&client));
|
||||
// start infinite loop on main thread
|
||||
ClientCLI_run(&client);
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
49
src/cli/modes/RandomBytes.c
Normal file
49
src/cli/modes/RandomBytes.c
Normal file
@@ -0,0 +1,49 @@
|
||||
#include "modes.h"
|
||||
#include "cryptography/cryptography.h"
|
||||
#include "tlibc/base64.h"
|
||||
|
||||
Result(void) run_RandomBytes(u32 key_size) {
|
||||
Deferral(4);
|
||||
|
||||
printfe("generating random bytes...\n");
|
||||
br_hmac_drbg_context rng = { .vtable = &br_hmac_drbg_vtable };
|
||||
rng_init_sha256_seedFromSystem(&rng.vtable);
|
||||
Array(u8) random_buf = Array_u8_alloc(1024);
|
||||
u32 full_buffers_n = key_size / random_buf.len;
|
||||
u32 remaining_n = key_size % random_buf.len;
|
||||
while(full_buffers_n > 0){
|
||||
full_buffers_n--;
|
||||
br_hmac_drbg_generate(&rng, random_buf.data, random_buf.len);
|
||||
fwrite(random_buf.data, 1, random_buf.len, stdout);
|
||||
}
|
||||
|
||||
br_hmac_drbg_generate(&rng, random_buf.data, remaining_n);
|
||||
fwrite(random_buf.data, 1, remaining_n, stdout);
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) run_RandomBytesBase64(u32 key_size) {
|
||||
Deferral(4);
|
||||
|
||||
printfe("generating random bytes...\n");
|
||||
br_hmac_drbg_context rng = { .vtable = &br_hmac_drbg_vtable };
|
||||
rng_init_sha256_seedFromSystem(&rng.vtable);
|
||||
Array(u8) random_buf = Array_u8_alloc(1024);
|
||||
Array(char) base64_buf = Array_char_alloc(base64_encodedSize(random_buf.len));
|
||||
u32 full_buffers_n = key_size / random_buf.len;
|
||||
u32 remaining_n = key_size % random_buf.len;
|
||||
u32 enc_size = 0;
|
||||
while(full_buffers_n > 0){
|
||||
full_buffers_n--;
|
||||
br_hmac_drbg_generate(&rng, random_buf.data, random_buf.len);
|
||||
enc_size = base64_encode(random_buf.data, random_buf.len, base64_buf.data);
|
||||
fwrite(base64_buf.data, 1, enc_size, stdout);
|
||||
}
|
||||
|
||||
br_hmac_drbg_generate(&rng, random_buf.data, remaining_n);
|
||||
enc_size = base64_encode(random_buf.data, remaining_n, base64_buf.data);
|
||||
fwrite(base64_buf.data, 1, enc_size, stdout);
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
64
src/cli/modes/RsaGen.c
Normal file
64
src/cli/modes/RsaGen.c
Normal file
@@ -0,0 +1,64 @@
|
||||
#include "modes.h"
|
||||
#include "cryptography/RSA.h"
|
||||
|
||||
|
||||
|
||||
Result(void) run_RsaGenStdin(u32 key_size) {
|
||||
Deferral(4);
|
||||
|
||||
printfe("reading stdin...\n");
|
||||
Array(u8) input_buf = Array_u8_alloc(64*1024);
|
||||
Defer(Array_u8_destroy(&input_buf));
|
||||
br_hmac_drbg_context rng = { .vtable = &br_hmac_drbg_vtable };
|
||||
br_hmac_drbg_init(&rng, &br_sha256_vtable, NULL, 0);
|
||||
i64 read_n = 0;
|
||||
do {
|
||||
read_n = fread(input_buf.data, 1, input_buf.len, stdin);
|
||||
if(read_n < 0){
|
||||
Return RESULT_ERROR_LITERAL("ERROR: can't read stdin");
|
||||
}
|
||||
// put bytes to rng as seed
|
||||
br_hmac_drbg_update(&rng, input_buf.data, read_n);
|
||||
} while(read_n == input_buf.len);
|
||||
printfe("generating RSA key pair based on stdin...\n");
|
||||
br_rsa_private_key sk;
|
||||
br_rsa_public_key pk;
|
||||
try_void(RSA_generateKeyPair(key_size, &sk, &pk, &rng.vtable));
|
||||
Defer(
|
||||
RSA_destroyPrivateKey(&sk);
|
||||
RSA_destroyPublicKey(&pk);
|
||||
);
|
||||
|
||||
str sk_str = RSA_serializePrivateKey_base64(&sk);
|
||||
printf("rsa_private_key = %s\n", sk_str.data);
|
||||
str_destroy(sk_str);
|
||||
|
||||
str pk_str = RSA_serializePublicKey_base64(&pk);
|
||||
printf("\nrsa_public_key = %s\n", pk_str.data);
|
||||
str_destroy(pk_str);
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) run_RsaGenRandom(u32 key_size) {
|
||||
Deferral(4);
|
||||
|
||||
printfe("generating random RSA key pair...\n");
|
||||
br_rsa_private_key sk;
|
||||
br_rsa_public_key pk;
|
||||
try_void(RSA_generateKeyPairFromSystemRandom(key_size, &sk, &pk));
|
||||
Defer(
|
||||
RSA_destroyPrivateKey(&sk);
|
||||
RSA_destroyPublicKey(&pk);
|
||||
);
|
||||
|
||||
str sk_str = RSA_serializePrivateKey_base64(&sk);
|
||||
printf("rsa_private_key = %s\n", sk_str.data);
|
||||
str_destroy(sk_str);
|
||||
|
||||
str pk_str = RSA_serializePublicKey_base64(&pk);
|
||||
printf("\nrsa_public_key = %s\n", pk_str.data);
|
||||
str_destroy(pk_str);
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
98
src/cli/modes/ServerMode.c
Normal file
98
src/cli/modes/ServerMode.c
Normal file
@@ -0,0 +1,98 @@
|
||||
#include <pthread.h>
|
||||
#include "tcp-chat.h"
|
||||
#include "modes.h"
|
||||
#include "tlibc/time.h"
|
||||
#include "tlibc/term.h"
|
||||
|
||||
typedef struct ServerLogger {
|
||||
pthread_mutex_t mutex;
|
||||
} ServerLogger;
|
||||
|
||||
void ServerLogger_construct(ServerLogger* self){
|
||||
try_fatal_stderrcode(pthread_mutex_init(&self->mutex, NULL));
|
||||
try_fatal_void(term_init());
|
||||
}
|
||||
|
||||
void ServerLogger_destroy(ServerLogger* self){
|
||||
pthread_mutex_destroy(&self->mutex);
|
||||
term_resetColors();
|
||||
}
|
||||
|
||||
static void log_func(void* _logger, cstr context, LogSeverity severity, cstr msg){
|
||||
ServerLogger* logger = _logger;
|
||||
|
||||
cstr severity_cstr;
|
||||
Color16 fg;
|
||||
|
||||
switch(severity){
|
||||
default:
|
||||
severity_cstr = "INVALID_LOG_SEVERITY";
|
||||
fg = Color16_DarkRed;
|
||||
break;
|
||||
case LogSeverity_Debug:
|
||||
severity_cstr = "DBUG";
|
||||
fg = Color16_Gray;
|
||||
break;
|
||||
case LogSeverity_Info:
|
||||
severity_cstr = "INFO";
|
||||
fg = Color16_White;
|
||||
break;
|
||||
case LogSeverity_Warn:
|
||||
severity_cstr = "WARN";
|
||||
fg = Color16_Yellow;
|
||||
break;
|
||||
case LogSeverity_Error:
|
||||
severity_cstr = "EROR";
|
||||
fg = Color16_Red;
|
||||
break;
|
||||
}
|
||||
|
||||
pthread_mutex_lock(&logger->mutex);
|
||||
|
||||
DateTime dt;
|
||||
DateTime_getLocal(&dt);
|
||||
|
||||
term_setFgColor16(fg);
|
||||
printf("[" FMT_DateTime_text "][%s/%s]: %s\n", DT_expand(dt), context, severity_cstr, msg);
|
||||
term_setFgColor16(Color16_Magenta);
|
||||
|
||||
pthread_mutex_unlock(&logger->mutex);
|
||||
}
|
||||
|
||||
Result(void) run_ServerMode(cstr config_path) {
|
||||
Deferral(4);
|
||||
|
||||
// open file
|
||||
try(FILE* config_file, p, file_open(config_path, FO_ReadExisting));
|
||||
Defer(file_close(config_file));
|
||||
|
||||
// read whole file into str
|
||||
str config_file_content = str_null;
|
||||
try_void(file_readWholeText(config_file, &config_file_content));
|
||||
Defer(str_destroy(config_file_content));
|
||||
|
||||
// create logger
|
||||
ServerLogger logger;
|
||||
ServerLogger_construct(&logger);
|
||||
Defer(ServerLogger_destroy(&logger));
|
||||
|
||||
// init server
|
||||
try(Server* server, p,
|
||||
Server_create(
|
||||
config_file_content, config_path,
|
||||
&logger, log_func
|
||||
)
|
||||
);
|
||||
Defer(Server_free(server));
|
||||
|
||||
// manually close file and free config_buf
|
||||
file_close(config_file);
|
||||
config_file = NULL;
|
||||
str_destroy(config_file_content);
|
||||
config_file_content.data = NULL;
|
||||
|
||||
// start infinite loop on main thread
|
||||
try_void(Server_run(server));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
19
src/cli/modes/modes.h
Normal file
19
src/cli/modes/modes.h
Normal file
@@ -0,0 +1,19 @@
|
||||
#pragma once
|
||||
#include "tlibc/errors.h"
|
||||
#include "tlibc/filesystem.h"
|
||||
|
||||
typedef enum ProgramMode {
|
||||
ClientMode,
|
||||
ServerMode,
|
||||
RsaGenStdin,
|
||||
RsaGenRandom,
|
||||
RandomBytes,
|
||||
RandomBytesBase64,
|
||||
} ProgramMode;
|
||||
|
||||
Result(void) run_ClientMode(cstr config_path);
|
||||
Result(void) run_ServerMode(cstr config_path);
|
||||
Result(void) run_RsaGenStdin(u32 key_size);
|
||||
Result(void) run_RsaGenRandom(u32 key_size);
|
||||
Result(void) run_RandomBytes(u32 key_size);
|
||||
Result(void) run_RandomBytesBase64(u32 key_size);
|
||||
@@ -1,44 +0,0 @@
|
||||
#include "client.h"
|
||||
#include "tlibc/collections/List.h"
|
||||
|
||||
void ClientCredentials_destroy(ClientCredentials* cred){
|
||||
if(!cred)
|
||||
return;
|
||||
free(cred->username.data);
|
||||
free(cred->user_data_key.data);
|
||||
free(cred->token.data);
|
||||
}
|
||||
|
||||
|
||||
Result(void) ClientCredentials_tryConstruct(ClientCredentials* cred,
|
||||
str username, str password)
|
||||
{
|
||||
Deferral(8);
|
||||
|
||||
memset(cred, 0, sizeof(ClientCredentials));
|
||||
bool success = false;
|
||||
Defer(if(!success) ClientCredentials_destroy(cred));
|
||||
|
||||
cred->username = str_copy(username);
|
||||
|
||||
// concat password and username
|
||||
List(u8) data_to_hash = List_alloc_size(password.size + username.size + PASSWORD_HASH_SIZE);
|
||||
Defer(free(data_to_hash.data));
|
||||
List_push_size(&data_to_hash, password.data, password.size);
|
||||
List_push_size(&data_to_hash, username.data, username.size);
|
||||
|
||||
// lvl 1 hash - is used as AES key for user data
|
||||
cred->user_data_key = Array_alloc(u8, PASSWORD_HASH_SIZE);
|
||||
hash_password(List_castTo_Array(data_to_hash), cred->user_data_key.data, PASSWORD_HASH_LVL_ROUNDS);
|
||||
// concat lvl 1 hash to data_to_hash
|
||||
List_push_size(&data_to_hash, cred->user_data_key.data, cred->user_data_key.size);
|
||||
// lvl 2 hash - is used for authentification
|
||||
cred->token = Array_alloc(u8, PASSWORD_HASH_SIZE);
|
||||
hash_password(List_castTo_Array(data_to_hash), cred->token.data, PASSWORD_HASH_LVL_ROUNDS);
|
||||
|
||||
AESBlockEncryptor_construct(&cred->user_data_aes_enc, cred->user_data_key, AESBlockEncryptor_DEFAULT_CLASS);
|
||||
AESBlockDecryptor_construct(&cred->user_data_aes_dec, cred->user_data_key, AESBlockDecryptor_DEFAULT_CLASS);
|
||||
|
||||
success = true;
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
@@ -1,116 +1,119 @@
|
||||
#include "client.h"
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
#include "client_internal.h"
|
||||
#include "requests/requests.h"
|
||||
|
||||
void ServerConnection_close(ServerConnection* conn){
|
||||
if(!conn)
|
||||
void ServerConnection_close(ServerConnection* self){
|
||||
if(!self)
|
||||
return;
|
||||
RSA_destroyPublicKey(&conn->server_pk);
|
||||
EncryptedSocketTCP_destroy(&conn->sock);
|
||||
free(conn->session_key.data);
|
||||
free(conn);
|
||||
RSA_destroyPublicKey(&self->server_pk);
|
||||
EncryptedSocketTCP_destroy(&self->sock);
|
||||
Array_u8_destroy(&self->token);
|
||||
Array_u8_destroy(&self->session_key);
|
||||
MessageBlock_destroy(&self->received_message_block);
|
||||
free(self);
|
||||
}
|
||||
|
||||
/// @brief
|
||||
/// @param server_link_cstr address:port:public_key
|
||||
/// @return
|
||||
Result(void) ServerLink_parse(cstr server_link_cstr, EndpointIPv4* server_end_out, br_rsa_public_key* server_key_out){
|
||||
Deferral(8);
|
||||
str server_link_str = str_from_cstr(server_link_cstr);
|
||||
|
||||
// parse address and port
|
||||
i32 sep_pos = str_seekChar(server_link_str, ':', 0);
|
||||
if(sep_pos == -1){
|
||||
Return RESULT_ERROR_FMT("server link is invalid: %s", server_link_cstr);
|
||||
}
|
||||
*server_end_out = EndpointIPv4_INVALID;
|
||||
try_void(EndpointIPv4_parse(server_link_cstr, server_end_out));
|
||||
if(EndpointIPv4_is_invalid(*server_end_out)){
|
||||
Return RESULT_ERROR_FMT("server address or port is invalid: %s", server_link_cstr);
|
||||
}
|
||||
|
||||
// parse public key
|
||||
sep_pos = str_seekChar(server_link_str, ':', sep_pos + 1);
|
||||
if(sep_pos == -1){
|
||||
Return RESULT_ERROR_FMT("server link is invalid: %s", server_link_cstr);
|
||||
}
|
||||
str server_key_str = str_sliceAfter(server_link_str, sep_pos + 1);
|
||||
char* server_key_cstr = str_copy(server_key_str).data;
|
||||
Defer(free(server_key_cstr));
|
||||
try_void(RSA_parsePublicKey_base64(server_key_cstr, server_key_out));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(ServerConnection*) ServerConnection_open(cstr server_link_cstr){
|
||||
Result(ServerConnection*) ServerConnection_open(Client* client, cstr server_addr_cstr, cstr server_pk_base64)
|
||||
{
|
||||
Deferral(16);
|
||||
|
||||
ServerConnection* conn = (ServerConnection*)malloc(sizeof(ServerConnection));
|
||||
memset(conn, 0, sizeof(*conn));
|
||||
zeroStruct(conn);
|
||||
bool success = false;
|
||||
Defer(if(!success) ServerConnection_close(conn));
|
||||
|
||||
try_void(ServerLink_parse(server_link_cstr, &conn->server_end, &conn->server_pk));
|
||||
conn->client = client;
|
||||
|
||||
// TODO: parse domain name and get ip from it
|
||||
conn->server_end = EndpointIPv4_INVALID;
|
||||
try_void(EndpointIPv4_parse(server_addr_cstr, &conn->server_end));
|
||||
if(EndpointIPv4_is_invalid(conn->server_end)){
|
||||
Return RESULT_ERROR_FMT("server address or port is invalid: %s", server_addr_cstr);
|
||||
}
|
||||
|
||||
try_void(RSA_parsePublicKey_base64(server_pk_base64, &conn->server_pk));
|
||||
RSAEncryptor_construct(&conn->rsa_enc, &conn->server_pk);
|
||||
|
||||
conn->session_key = Array_alloc_size(AES_SESSION_KEY_SIZE);
|
||||
// generate random session key
|
||||
// lvl 2 hash - is used for authentification
|
||||
conn->token = Array_u8_alloc(PASSWORD_HASH_SIZE);
|
||||
// hash user_data_key with server_pk once
|
||||
Array(u8) server_pk_data = Array_u8_construct(conn->server_pk.n,
|
||||
BR_RSA_KBUF_PUB_SIZE(conn->server_pk.nlen * 8));
|
||||
u8 server_pk_hash[PASSWORD_HASH_SIZE];
|
||||
Array(u8) server_pk_hash_array = Array_u8_construct(server_pk_hash, PASSWORD_HASH_SIZE);
|
||||
hash_password(conn->client->user_data_key, server_pk_data,
|
||||
server_pk_hash, 1);
|
||||
// hash user_data_key with server_pk_hash
|
||||
hash_password(conn->token, server_pk_hash_array,
|
||||
conn->token.data, PASSWORD_HASH_LVL_ROUNDS);
|
||||
|
||||
// generate session random AES key
|
||||
conn->session_key = Array_u8_alloc(AES_SESSION_KEY_SIZE);
|
||||
br_hmac_drbg_context key_rng = { .vtable = &br_hmac_drbg_vtable };
|
||||
rng_init_sha256_seedFromSystem(&key_rng.vtable);
|
||||
br_hmac_drbg_generate(&key_rng, conn->session_key.data, conn->session_key.size);
|
||||
br_hmac_drbg_generate(&key_rng, conn->session_key.data, conn->session_key.len);
|
||||
|
||||
// connect to server address
|
||||
try(Socket _s, i, socket_open_TCP());
|
||||
// TODO: client socket waits infinitely if server is paused on breakpoint
|
||||
try_void(socket_TCP_enableAliveChecks_default(_s));
|
||||
try_void(socket_connect(_s, conn->server_end));
|
||||
EncryptedSocketTCP_construct(&conn->sock, _s, NETWORK_BUFFER_SIZE, conn->session_key);
|
||||
|
||||
// send PacketHeader and ClientHandshake
|
||||
// encryption by server public key
|
||||
PacketHeader packet_header;
|
||||
// send ClientHandshake using server public key for encryption
|
||||
PacketHeader req_header;
|
||||
ClientHandshake client_handshake;
|
||||
try_void(ClientHandshake_tryConstruct(&client_handshake, &packet_header,
|
||||
try_void(ClientHandshake_tryConstruct(&client_handshake, &req_header,
|
||||
conn->session_key));
|
||||
try_void(EncryptedSocketTCP_sendStructRSA(&conn->sock, &conn->rsa_enc, &packet_header));
|
||||
try_void(EncryptedSocketTCP_sendStructRSA(&conn->sock, &conn->rsa_enc, &req_header));
|
||||
try_void(EncryptedSocketTCP_sendStructRSA(&conn->sock, &conn->rsa_enc, &client_handshake));
|
||||
|
||||
// receive server response
|
||||
try_void(EncryptedSocketTCP_recvStruct(&conn->sock, &packet_header));
|
||||
try_void(PacketHeader_validateMagic(&packet_header));
|
||||
PacketHeader res_header;
|
||||
ServerHandshake server_handshake;
|
||||
try_void(recvResponse(&conn->sock, &res_header, &server_handshake,
|
||||
PacketType_ServerHandshake));
|
||||
conn->session_id = server_handshake.session_id;
|
||||
|
||||
// handle server response
|
||||
switch(packet_header.type){
|
||||
case PacketType_ErrorMessage: {
|
||||
ErrorMessage err_msg;
|
||||
try_void(EncryptedSocketTCP_recvStruct(&conn->sock, &err_msg));
|
||||
if(err_msg.msg_size > conn->sock.recv_buf.size)
|
||||
err_msg.msg_size = conn->sock.recv_buf.size;
|
||||
Array(u8) err_buf = Array_alloc_size(err_msg.msg_size + 1);
|
||||
bool err_msg_completed = false;
|
||||
Defer(if(!err_msg_completed) free(err_buf.data));
|
||||
|
||||
// receive message content
|
||||
try_void(
|
||||
EncryptedSocketTCP_recv(
|
||||
&conn->sock,
|
||||
Array_sliceTo(err_buf, err_msg.msg_size),
|
||||
SocketRecvFlag_WholeBuffer
|
||||
)
|
||||
);
|
||||
|
||||
((u8*)err_buf.data)[err_msg.msg_size] = 0;
|
||||
err_msg_completed = true;
|
||||
Return RESULT_ERROR((char*)err_buf.data, true);
|
||||
}
|
||||
case PacketType_ServerHandshake: {
|
||||
ServerHandshake server_handshake;
|
||||
try_void(EncryptedSocketTCP_recvStruct(&conn->sock, &server_handshake));
|
||||
conn->session_id = server_handshake.session_id;
|
||||
break;
|
||||
}
|
||||
default:
|
||||
Return RESULT_ERROR_FMT("unexpected response type: %i", packet_header.type);
|
||||
}
|
||||
MessageBlock_alloc(&conn->received_message_block);
|
||||
|
||||
success = true;
|
||||
Return RESULT_VALUE(p, conn);
|
||||
}
|
||||
|
||||
Result(void) ServerConnection_requestServerName(ServerConnection* conn, str* out_str){
|
||||
if(conn == NULL){
|
||||
return RESULT_ERROR_LITERAL("Client is not connected to a server");
|
||||
}
|
||||
Deferral(4);
|
||||
|
||||
PacketHeader req_header, res_header;
|
||||
ServerPublicInfoRequest public_info_req;
|
||||
ServerPublicInfoResponse public_info_res;
|
||||
ServerPublicInfoRequest_construct(&public_info_req, &req_header,
|
||||
ServerPublicInfo_Name);
|
||||
try_void(sendRequest(&conn->sock, &req_header, &public_info_req));
|
||||
try_void(recvResponse(&conn->sock, &res_header, &public_info_res,
|
||||
PacketType_ServerPublicInfoResponse));
|
||||
try_void(recvStr(&conn->sock, public_info_res.data_size, out_str));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) ServerConnection_requestServerDescription(ServerConnection* conn, str* out_str){
|
||||
if(conn == NULL){
|
||||
return RESULT_ERROR_LITERAL("Client is not connected to a server");
|
||||
}
|
||||
Deferral(4);
|
||||
|
||||
PacketHeader req_header, res_header;
|
||||
ServerPublicInfoRequest public_info_req;
|
||||
ServerPublicInfoResponse public_info_res;
|
||||
ServerPublicInfoRequest_construct(&public_info_req, &req_header,
|
||||
ServerPublicInfo_Description);
|
||||
try_void(sendRequest(&conn->sock, &req_header, &public_info_req));
|
||||
try_void(recvResponse(&conn->sock, &res_header, &public_info_res,
|
||||
PacketType_ServerPublicInfoResponse));
|
||||
try_void(recvStr(&conn->sock, public_info_res.data_size, out_str));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
@@ -1,186 +1,176 @@
|
||||
#include "client.h"
|
||||
#include "term.h"
|
||||
#include "tlibc/time.h"
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
#include "client/client_internal.h"
|
||||
#include "client/requests/requests.h"
|
||||
|
||||
static const str greeting_art = STR(
|
||||
" ^,,^ ╱|\n"
|
||||
" ( •·•) Meum! (o.o`7\n"
|
||||
" / ` | Meum... |`˜ \\\n"
|
||||
"\\(_,J J L l`,)/\n"
|
||||
);
|
||||
|
||||
static const str farewell_art = STR(
|
||||
" ^,,^ ╱|\n"
|
||||
" ( -.-) (>,<`7\n"
|
||||
" / ` | Goodbye! |`˜ \\\n"
|
||||
"\\(_,J J L l`,)/\n"
|
||||
);
|
||||
|
||||
Result(void) Client_createFromConfig(cstr config_path){
|
||||
Deferral(16);
|
||||
|
||||
Client* client = (Client*)malloc(sizeof(Client));
|
||||
memset(client, 0, sizeof(Client));
|
||||
bool success = false;
|
||||
Defer(if(!success) Client_free(client));
|
||||
|
||||
(void)config_path;
|
||||
|
||||
success = true;
|
||||
Return RESULT_VALUE(p, client);
|
||||
}
|
||||
|
||||
void Client_free(Client* client){
|
||||
if(!client)
|
||||
void Client_free(Client* self){
|
||||
if(!self)
|
||||
return;
|
||||
|
||||
ClientCredentials_destroy(&client->cred);
|
||||
ServerConnection_close(client->server_connection);
|
||||
free(client);
|
||||
str_destroy(self->username);
|
||||
Array_u8_destroy(&self->user_data_key);
|
||||
ServerConnection_close(self->conn);
|
||||
free(self);
|
||||
}
|
||||
|
||||
static Result(void) commandExec(Client* client, str command, bool* stop);
|
||||
|
||||
static Result(void) askUserNameAndPassword(ClientCredentials* cred){
|
||||
Deferral(8);
|
||||
|
||||
char username_buf[128];
|
||||
str username = str_null;
|
||||
while(true) {
|
||||
printf("username: ");
|
||||
if(fgets(username_buf, sizeof(username_buf), stdin) == NULL){
|
||||
Return RESULT_ERROR("STDIN is closed", false);
|
||||
}
|
||||
username = str_from_cstr(username_buf);
|
||||
str_trim(&username, true);
|
||||
if(username.size < USERNAME_SIZE_MIN || username.size > USERNAME_SIZE_MAX){
|
||||
printf("ERROR: username length (in bytes) must be >= %i and <= %i\n",
|
||||
USERNAME_SIZE_MIN, USERNAME_SIZE_MAX);
|
||||
}
|
||||
else break;
|
||||
}
|
||||
|
||||
char password_buf[128];
|
||||
str password = str_null;
|
||||
while(true) {
|
||||
printf("password: ");
|
||||
// TODO: hide password
|
||||
if(fgets(password_buf, sizeof(password_buf), stdin) == NULL){
|
||||
Return RESULT_ERROR("STDIN is closed", false);
|
||||
}
|
||||
password = str_from_cstr(password_buf);
|
||||
str_trim(&password, true);
|
||||
if(password.size < PASSWORD_SIZE_MIN || password.size > PASSWORD_SIZE_MAX){
|
||||
printf("ERROR: password length (in bytes) must be >= %i and <= %i\n",
|
||||
PASSWORD_SIZE_MIN, PASSWORD_SIZE_MAX);
|
||||
}
|
||||
else break;
|
||||
}
|
||||
|
||||
try_void(ClientCredentials_tryConstruct(cred, username, password));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) Client_run(Client* client) {
|
||||
Result(Client*) Client_create(str username, str password){
|
||||
Deferral(16);
|
||||
if(!term_init()){
|
||||
Return RESULT_ERROR("can't init terminal", false);
|
||||
}
|
||||
|
||||
fputs(greeting_art.data, stdout);
|
||||
try_void(askUserNameAndPassword(&client->cred));
|
||||
Client* self = (Client*)malloc(sizeof(Client));
|
||||
zeroStruct(self);
|
||||
bool success = false;
|
||||
Defer(if(!success) Client_free(self));
|
||||
|
||||
Array(char) input_buf = Array_alloc(char, 10000);
|
||||
Defer(free(input_buf.data));
|
||||
str command_input = str_null;
|
||||
bool stop = false;
|
||||
while(!stop){
|
||||
sleepMsec(50);
|
||||
fputs("> ", stdout);
|
||||
if(fgets(input_buf.data, input_buf.size, stdin) == NULL){
|
||||
Return RESULT_ERROR("STDIN is closed", false);
|
||||
}
|
||||
self->username = str_copy(username);
|
||||
|
||||
command_input = str_from_cstr(input_buf.data);
|
||||
str_trim(&command_input, true);
|
||||
if(command_input.size == 0)
|
||||
continue;
|
||||
// lvl 1 hash - is used as AES key for user data
|
||||
self->user_data_key = Array_u8_alloc(PASSWORD_HASH_SIZE);
|
||||
hash_password(str_castTo_Array_u8(password), str_castTo_Array_u8(username),
|
||||
self->user_data_key.data, PASSWORD_HASH_LVL_ROUNDS);
|
||||
|
||||
ResultVar(void) com_result = commandExec(client, command_input, &stop);
|
||||
if(com_result.error){
|
||||
str e_str = Error_toStr(com_result.error);
|
||||
printf("%s\n", e_str.data);
|
||||
free(e_str.data);
|
||||
Error_free(com_result.error);
|
||||
}
|
||||
}
|
||||
success = true;
|
||||
Return RESULT_VALUE(p, self);
|
||||
}
|
||||
|
||||
Result(void) Client_connect(Client* self, cstr server_addr_cstr, cstr server_pk_base64){
|
||||
Deferral(8);
|
||||
Client_disconnect(self);
|
||||
try(self->conn, p,
|
||||
ServerConnection_open(self, server_addr_cstr, server_pk_base64)
|
||||
);
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
void Client_disconnect(Client* self){
|
||||
ServerConnection_close(self->conn);
|
||||
self->conn = NULL;
|
||||
}
|
||||
|
||||
str Client_getUserName(Client* client){
|
||||
return client->username;
|
||||
}
|
||||
|
||||
Array(u8) Client_getUserDataKey(Client* client){
|
||||
return client->user_data_key;
|
||||
}
|
||||
|
||||
Result(void) Client_getServerName(Client* self, str* out_str){
|
||||
Deferral(1);
|
||||
try_assert(self != NULL);
|
||||
try_assert(self->conn != NULL && "didn't connect to a server yet");
|
||||
|
||||
try_void(ServerConnection_requestServerName(self->conn, out_str));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
#define is_alias(LITERAL) str_equals(command, STR(LITERAL))
|
||||
Result(void) Client_getServerDescription(Client* self, str* out_str){
|
||||
Deferral(1);
|
||||
try_assert(self != NULL);
|
||||
try_assert(self->conn != NULL && "didn't connect to a server yet");
|
||||
|
||||
static Result(void) commandExec(Client* client, str command, bool* stop){
|
||||
Deferral(64);
|
||||
char answer_buf[10000];
|
||||
const u32 answer_buf_size = sizeof(answer_buf);
|
||||
if(is_alias("q") || is_alias("quit") || is_alias("exit")){
|
||||
fputs(farewell_art.data, stdout);
|
||||
*stop = true;
|
||||
}
|
||||
else if(is_alias("clear")){
|
||||
term_clear();
|
||||
}
|
||||
else if(is_alias("h") || is_alias("help")){
|
||||
puts(
|
||||
"COMMANDS:\n"
|
||||
"h, help Show this message.\n"
|
||||
"q, quit, exit Close the program.\n"
|
||||
"clear Clear the screen.\n"
|
||||
"j, join Join a server.\n"
|
||||
"c, connect Connect to a server you joined.\n"
|
||||
);
|
||||
}
|
||||
else if (is_alias("j") || is_alias("join")){
|
||||
ServerConnection_close(client->server_connection);
|
||||
|
||||
puts("Enter server address (ip:port:public_key): ");
|
||||
if(fgets(answer_buf, answer_buf_size, stdin) == NULL){
|
||||
Return RESULT_ERROR("STDIN is closed", false);
|
||||
}
|
||||
str new_server_link = str_from_cstr(answer_buf);
|
||||
str_trim(&new_server_link, true);
|
||||
|
||||
printf("connecting to server...\n");
|
||||
try(client->server_connection, p,
|
||||
ServerConnection_open(new_server_link.data));
|
||||
printf("connection established\n");
|
||||
|
||||
// TODO: request server info
|
||||
// show server info
|
||||
// save server info to user's db
|
||||
// try log in
|
||||
// if not registered, request registration and then log in
|
||||
|
||||
// call Client_runIO():
|
||||
// function with infinite loop which sends and receives messages
|
||||
// with navigation across server channels
|
||||
//
|
||||
}
|
||||
else if(is_alias("c") || is_alias("connect")){
|
||||
// TODO: read saved servers from database
|
||||
// show scrollable list of them
|
||||
// select one
|
||||
// try log in
|
||||
// if not registered, ask user if they want to register
|
||||
// regiser and then log in
|
||||
}
|
||||
else {
|
||||
printf("ERROR: unknown command.\n"
|
||||
"Use 'h' to see list of avaliable commands\n");
|
||||
}
|
||||
try_void(ServerConnection_requestServerDescription(self->conn, out_str));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) Client_register(Client* self, i64* out_user_id){
|
||||
Deferral(1);
|
||||
try_assert(self != NULL);
|
||||
try_assert(self->conn != NULL && "didn't connect to a server yet");
|
||||
|
||||
PacketHeader req_head, res_head;
|
||||
RegisterRequest req;
|
||||
RegisterResponse res;
|
||||
try_void(RegisterRequest_tryConstruct(&req, &req_head, self->username, self->conn->token));
|
||||
try_void(sendRequest(&self->conn->sock, &req_head, &req));
|
||||
try_void(recvResponse(&self->conn->sock, &res_head, &res, PacketType_RegisterResponse));
|
||||
self->conn->user_id = res.user_id;
|
||||
*out_user_id = res.user_id;
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) Client_login(Client* self, i64* out_user_id, i64* out_landing_channel_id){
|
||||
Deferral(1);
|
||||
try_assert(self != NULL);
|
||||
try_assert(self->conn != NULL && "didn't connect to a server yet");
|
||||
|
||||
PacketHeader req_head, res_head;
|
||||
LoginRequest req;
|
||||
LoginResponse res;
|
||||
try_void(LoginRequest_tryConstruct(&req, &req_head, self->username, self->conn->token));
|
||||
try_void(sendRequest(&self->conn->sock, &req_head, &req));
|
||||
try_void(recvResponse(&self->conn->sock, &res_head, &res, PacketType_LoginResponse));
|
||||
self->conn->user_id = res.user_id;
|
||||
*out_user_id = res.user_id;
|
||||
*out_landing_channel_id = res.landing_channel_id;
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(i64) Client_sendMessage(Client* self, i64 channel_id, Array(u8) content, DateTime* out_timestamp){
|
||||
Deferral(1);
|
||||
try_assert(self != NULL);
|
||||
try_assert(self->conn != NULL && "didn't connect to a server yet");
|
||||
try_assert(content.len >= MESSAGE_SIZE_MIN && content.len <= MESSAGE_SIZE_MAX);
|
||||
|
||||
PacketHeader req_head, res_head;
|
||||
SendMessageRequest req;
|
||||
SendMessageResponse res;
|
||||
SendMessageRequest_construct(&req, &req_head, channel_id, content.len);
|
||||
try_void(sendRequest(&self->conn->sock, &req_head, &req));
|
||||
try_void(recvResponse(&self->conn->sock, &res_head, &res, PacketType_SendMessageResponse));
|
||||
*out_timestamp = res.timestamp;
|
||||
|
||||
Return RESULT_VALUE(i, res.message_id);
|
||||
}
|
||||
|
||||
Result(u32) Client_receiveMessageBlock(Client* self, i64 channel_id, i64 first_message_id, u32 messages_count){
|
||||
Deferral(1);
|
||||
try_assert(self != NULL);
|
||||
try_assert(self->conn != NULL && "didn't connect to a server yet");
|
||||
|
||||
PacketHeader req_head, res_head;
|
||||
GetMessageBlockRequest req;
|
||||
GetMessageBlockResponse res;
|
||||
GetMessageBlockRequest_construct(&req, &req_head, channel_id, first_message_id, messages_count);
|
||||
try_void(sendRequest(&self->conn->sock, &req_head, &req));
|
||||
try_void(recvResponse(&self->conn->sock, &res_head, &res, PacketType_GetMessageBlockResponse));
|
||||
self->conn->received_message_block.messages_count = res.messages_count;
|
||||
self->conn->received_message_block.datum.len = res.data_size;
|
||||
try_void(
|
||||
EncryptedSocketTCP_recv(
|
||||
&self->conn->sock,
|
||||
self->conn->received_message_block.datum,
|
||||
SocketRecvFlag_WholeBuffer
|
||||
)
|
||||
);
|
||||
|
||||
Return RESULT_VALUE(u, res.messages_count);
|
||||
}
|
||||
|
||||
Result(u32) Client_popMessage(Client* self, Array(u8) dst_content,
|
||||
i64* message_id, i64* sender_id, DateTime* timestamp_utc)
|
||||
{
|
||||
Deferral(1);
|
||||
try_assert(self != NULL);
|
||||
try_assert(self->conn != NULL && "didn't connect to a server yet");
|
||||
try_assert(dst_content.len >= MESSAGE_SIZE_MAX);
|
||||
|
||||
MessageMeta msg_meta = {0};
|
||||
try(bool read_success, u,
|
||||
MessageBlock_readMessage(
|
||||
&self->conn->received_message_block,
|
||||
&msg_meta,
|
||||
dst_content
|
||||
)
|
||||
);
|
||||
if(!read_success){
|
||||
Return RESULT_VALUE(u, 0);
|
||||
}
|
||||
|
||||
*message_id = msg_meta.id;
|
||||
*sender_id = msg_meta.sender_id;
|
||||
*timestamp_utc = msg_meta.timestamp;
|
||||
|
||||
Return RESULT_VALUE(u, msg_meta.data_size);
|
||||
}
|
||||
|
||||
@@ -1,43 +0,0 @@
|
||||
#pragma once
|
||||
#include "cryptography/AES.h"
|
||||
#include "cryptography/RSA.h"
|
||||
#include "network/encrypted_sockets.h"
|
||||
|
||||
typedef struct Client Client;
|
||||
|
||||
typedef struct ClientCredentials {
|
||||
str username;
|
||||
Array(u8) user_data_key;
|
||||
Array(u8) token;
|
||||
AESBlockEncryptor user_data_aes_enc;
|
||||
AESBlockDecryptor user_data_aes_dec;
|
||||
} ClientCredentials;
|
||||
|
||||
Result(void) ClientCredentials_tryConstruct(ClientCredentials* cred,
|
||||
str username, str password);
|
||||
|
||||
void ClientCredentials_destroy(ClientCredentials* cred);
|
||||
|
||||
|
||||
typedef struct ServerConnection {
|
||||
u64 session_id;
|
||||
EndpointIPv4 server_end;
|
||||
br_rsa_public_key server_pk;
|
||||
RSAEncryptor rsa_enc;
|
||||
Array(u8) session_key;
|
||||
EncryptedSocketTCP sock;
|
||||
} ServerConnection;
|
||||
|
||||
Result(ServerConnection*) ServerConnection_open(cstr server_link_cstr);
|
||||
|
||||
void ServerConnection_close(ServerConnection* conn);
|
||||
|
||||
|
||||
typedef struct Client {
|
||||
ClientCredentials cred;
|
||||
ServerConnection* server_connection;
|
||||
} Client;
|
||||
|
||||
Result(void) Client_createFromConfig(cstr config_path);
|
||||
void Client_free(Client* client);
|
||||
Result(void) Client_run(Client* client);
|
||||
40
src/client/client_internal.h
Normal file
40
src/client/client_internal.h
Normal file
@@ -0,0 +1,40 @@
|
||||
#pragma once
|
||||
#include "tcp-chat.h"
|
||||
#include "cryptography/AES.h"
|
||||
#include "cryptography/RSA.h"
|
||||
#include "network/encrypted_sockets.h"
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
|
||||
typedef struct ServerConnection ServerConnection;
|
||||
|
||||
typedef struct Client {
|
||||
str username;
|
||||
Array(u8) user_data_key;
|
||||
ServerConnection* conn;
|
||||
} Client;
|
||||
|
||||
typedef struct ServerConnection {
|
||||
Client* client;
|
||||
EndpointIPv4 server_end;
|
||||
br_rsa_public_key server_pk;
|
||||
RSAEncryptor rsa_enc;
|
||||
Array(u8) token;
|
||||
Array(u8) session_key;
|
||||
EncryptedSocketTCP sock;
|
||||
i64 session_id;
|
||||
i64 user_id;
|
||||
MessageBlock received_message_block;
|
||||
} ServerConnection;
|
||||
|
||||
/// @param server_addr_cstr
|
||||
/// @param server_pk_base64 public key encoded by `RSA_serializePublicKey_base64()`
|
||||
Result(ServerConnection*) ServerConnection_open(Client* client,
|
||||
cstr server_addr_cstr, cstr server_pk_base64);
|
||||
|
||||
void ServerConnection_close(ServerConnection* conn);
|
||||
|
||||
/// @param out_str heap-allocated string
|
||||
Result(void) ServerConnection_requestServerName(ServerConnection* conn, str* out_str);
|
||||
|
||||
/// @param out_str heap-allocated string
|
||||
Result(void) ServerConnection_requestServerDescription(ServerConnection* conn, str* out_str);
|
||||
43
src/client/requests/ErrorMessage.c
Normal file
43
src/client/requests/ErrorMessage.c
Normal file
@@ -0,0 +1,43 @@
|
||||
#include "requests.h"
|
||||
|
||||
Result(void) recvStr(EncryptedSocketTCP* sock, u32 size, str* out_str){
|
||||
Deferral(4);
|
||||
|
||||
str s = str_construct(malloc(size + 1), size, true);
|
||||
bool success = false;
|
||||
Defer(if(!success) free(s.data));
|
||||
|
||||
// receive message content
|
||||
try_void(
|
||||
EncryptedSocketTCP_recv(
|
||||
sock,
|
||||
str_castTo_Array_u8(s),
|
||||
SocketRecvFlag_WholeBuffer
|
||||
)
|
||||
);
|
||||
|
||||
s.data[s.len] = 0;
|
||||
*out_str = s;
|
||||
success = true;
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) recvErrorMessage(EncryptedSocketTCP* sock, PacketHeader* res_header,
|
||||
str* out_err_msg)
|
||||
{
|
||||
Deferral(4);
|
||||
|
||||
ErrorMessage res;
|
||||
try_void(PacketHeader_validateContentSize(res_header, sizeof(res)));
|
||||
try_void(EncryptedSocketTCP_recvStruct(sock, &res));
|
||||
// limit msg_size to fit in single EncryptedSocketTCP_recv call
|
||||
// TODO: receive ErrorMessage content in a loop
|
||||
if(res.msg_size > sock->recv_buf.len)
|
||||
res.msg_size = sock->recv_buf.len;
|
||||
|
||||
str err_msg;
|
||||
try_void(recvStr(sock, res.msg_size, &err_msg));
|
||||
*out_err_msg = err_msg;
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
34
src/client/requests/requests.c
Normal file
34
src/client/requests/requests.c
Normal file
@@ -0,0 +1,34 @@
|
||||
#include "requests.h"
|
||||
|
||||
|
||||
Result(void) _recvResponse(EncryptedSocketTCP* sock,
|
||||
PacketHeader* res_header, Array(u8) res, PacketType res_type)
|
||||
{
|
||||
Deferral(4);
|
||||
|
||||
try_void(EncryptedSocketTCP_recvStruct(sock, res_header));
|
||||
try_void(PacketHeader_validateMagic(res_header));
|
||||
if(res_header->type == PacketType_ErrorMessage){
|
||||
str err_msg;
|
||||
try_void(recvErrorMessage(sock, res_header, &err_msg));
|
||||
Return RESULT_ERROR(err_msg, true);
|
||||
}
|
||||
|
||||
try_void(PacketHeader_validateType(res_header, res_type));
|
||||
try_void(PacketHeader_validateContentSize(res_header, res.len));
|
||||
|
||||
try_void(EncryptedSocketTCP_recv(sock, res, SocketRecvFlag_WholeBuffer));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) _sendRequest(EncryptedSocketTCP* sock,
|
||||
PacketHeader* req_header, Array(u8) req)
|
||||
{
|
||||
Deferral(4);
|
||||
|
||||
try_void(EncryptedSocketTCP_sendStruct(sock, req_header));
|
||||
try_void(EncryptedSocketTCP_send(sock, req));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
22
src/client/requests/requests.h
Normal file
22
src/client/requests/requests.h
Normal file
@@ -0,0 +1,22 @@
|
||||
#pragma once
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
#include "client/client_internal.h"
|
||||
|
||||
|
||||
/// @param out_err_msg heap-allocated string
|
||||
Result(void) recvErrorMessage(EncryptedSocketTCP* sock, PacketHeader* res_header,
|
||||
str* out_err_msg);
|
||||
|
||||
/// @param out_str heap-allocated string
|
||||
Result(void) recvStr(EncryptedSocketTCP* sock, u32 size, str* out_str);
|
||||
|
||||
Result(void) _recvResponse(EncryptedSocketTCP* sock,
|
||||
PacketHeader* res_header, Array(u8) res, PacketType res_type);
|
||||
#define recvResponse(sock, res_header_ptr, res_ptr, res_type) \
|
||||
_recvResponse(sock, res_header_ptr, struct_castTo_Array_u8(res_ptr), res_type)
|
||||
|
||||
|
||||
Result(void) _sendRequest(EncryptedSocketTCP* sock,
|
||||
PacketHeader* req_header, Array(u8) req);
|
||||
#define sendRequest(sock, req_header_ptr, req_ptr) \
|
||||
_sendRequest(sock, req_header_ptr, struct_castTo_Array_u8(req_ptr))
|
||||
@@ -1,11 +0,0 @@
|
||||
#pragma once
|
||||
#include "tlibc/std.h"
|
||||
|
||||
#define USERNAME_SIZE_MIN 2
|
||||
#define USERNAME_SIZE_MAX 31
|
||||
#define PASSWORD_SIZE_MIN 8
|
||||
#define PASSWORD_SIZE_MAX 31
|
||||
#define PASSWORD_HASH_SIZE 32
|
||||
#define CHANNEL_NAME_MIN 1
|
||||
#define CHANNEL_NAME_MAX 127
|
||||
#define CHANNEL_DESC_MAX 4095
|
||||
36
src/config.c
36
src/config.c
@@ -1,36 +0,0 @@
|
||||
#include "config.h"
|
||||
|
||||
Result(void) config_findValue(str config_str, str key, str* value, bool throwNotFoundError){
|
||||
u32 line_n = 0;
|
||||
while(config_str.size > 0){
|
||||
line_n++;
|
||||
i32 line_end = str_seekChar(config_str, '\n', 0);
|
||||
if(line_end < 0)
|
||||
line_end = config_str.size - 1;
|
||||
str line = str_sliceBefore(config_str, line_end);
|
||||
config_str = str_sliceAfter(config_str, line_end + 1);
|
||||
|
||||
i32 sep_pos = str_seekChar(line, '=', 1);
|
||||
if(sep_pos < 0){
|
||||
//not a 'key = value' line
|
||||
continue;
|
||||
}
|
||||
|
||||
str line_key = str_sliceBefore(line, sep_pos - 1);
|
||||
str_trim(&line_key, false);
|
||||
if(str_equals(line_key, key)){
|
||||
str line_value = str_sliceAfter(line, sep_pos + 1);
|
||||
str_trim(&line_value, false);
|
||||
*value = line_value;
|
||||
return RESULT_VOID;
|
||||
}
|
||||
}
|
||||
|
||||
if(throwNotFoundError){
|
||||
char* key_cstr = str_copy(key).data;
|
||||
char* err_msg = sprintf_malloc("can't find key '%s'", key_cstr);
|
||||
free(key_cstr);
|
||||
return RESULT_ERROR(err_msg, true);
|
||||
}
|
||||
return RESULT_VOID;
|
||||
}
|
||||
@@ -1,6 +0,0 @@
|
||||
#pragma once
|
||||
#include "tlibc/errors.h"
|
||||
#include "tlibc/string/str.h"
|
||||
|
||||
/// searches for pattern `key = value`
|
||||
Result(void) config_findValue(str config_str, str key, str* value, bool throwNotFoundError);
|
||||
@@ -4,15 +4,21 @@
|
||||
// write data from src to array and increment array data pointer
|
||||
static inline void __Array_writeNext(Array(u8)* dst, u8* src, size_t size){
|
||||
memcpy(dst->data, src, size);
|
||||
*dst = Array_sliceFrom(*dst, size);
|
||||
*dst = Array_u8_sliceFrom(*dst, size);
|
||||
}
|
||||
|
||||
// read data from array to dst and increment array data pointer
|
||||
static inline void __Array_readNext(u8* dst, Array(u8)* src, size_t size){
|
||||
memcpy(dst, src->data, size);
|
||||
*src = Array_sliceFrom(*src, size);
|
||||
*src = Array_u8_sliceFrom(*src, size);
|
||||
}
|
||||
|
||||
static void __calcKeyCheckSum(Array(u8) key, void* dst){
|
||||
br_sha256_context sha_ctx;
|
||||
br_sha256_init(&sha_ctx);
|
||||
br_sha256_update(&sha_ctx, key.data, key.len);
|
||||
br_sha256_out(&sha_ctx, dst);
|
||||
}
|
||||
|
||||
//////////////////////////////////////////////////////////////////////////////
|
||||
// AESBlockEncryptor //
|
||||
@@ -21,34 +27,37 @@ static inline void __Array_readNext(u8* dst, Array(u8)* src, size_t size){
|
||||
void AESBlockEncryptor_construct(AESBlockEncryptor* ptr,
|
||||
Array(u8) key, const br_block_cbcenc_class* enc_class)
|
||||
{
|
||||
assert(key.size == 16 || key.size == 24 || key.size == 32);
|
||||
|
||||
ptr->enc_class = enc_class;
|
||||
ptr->enc_class->init((void*)ptr->enc_keys, key.data, key.size);
|
||||
AESBlockEncryptor_changeKey(ptr, key);
|
||||
|
||||
ptr->rng_ctx.vtable = &br_hmac_drbg_vtable;
|
||||
rng_init_sha256_seedFromSystem(&ptr->rng_ctx.vtable);
|
||||
|
||||
}
|
||||
|
||||
void AESBlockEncryptor_changeKey(AESBlockEncryptor* ptr, Array(u8) key)
|
||||
{
|
||||
assert(key.size == 16 || key.size == 24 || key.size == 32);
|
||||
ptr->enc_class->init((void*)ptr->enc_keys, key.data, key.size);
|
||||
assert(key.len == 16 || key.len == 24 || key.len == 32);
|
||||
ptr->enc_class->init((void*)ptr->enc_keys, key.data, key.len);
|
||||
__calcKeyCheckSum(key, ptr->key_checksum);
|
||||
}
|
||||
|
||||
Result(u32) AESBlockEncryptor_encrypt(AESBlockEncryptor* ptr,
|
||||
Array(u8) src, Array(u8) dst)
|
||||
{
|
||||
Deferral(4);
|
||||
u32 encrypted_size = AESBlockEncryptor_calcDstSize(src.size);
|
||||
try_assert(dst.size >= encrypted_size);
|
||||
u32 encrypted_size = AESBlockEncryptor_calcDstSize(src.len);
|
||||
try_assert(dst.len >= encrypted_size);
|
||||
|
||||
// generate random initial vector
|
||||
br_hmac_drbg_generate(&ptr->rng_ctx, ptr->iv, __AES_BLOCK_IV_SIZE);
|
||||
// write IV to the beginning of dst
|
||||
__Array_writeNext(&dst, ptr->iv, __AES_BLOCK_IV_SIZE);
|
||||
|
||||
const EncryptedBlockHeader header = { .padding_size = 16 - src.size % 16 };
|
||||
EncryptedBlockHeader header;
|
||||
zeroStruct(&header);
|
||||
memcpy(header.key_checksum, ptr->key_checksum, __AES_BLOCK_KEY_CHECKSUM_SIZE);
|
||||
header.padding_size = (16 - src.len % 16) % 16;
|
||||
// write header to buffer
|
||||
memcpy(ptr->buf, &header, sizeof(header));
|
||||
// encrypt header
|
||||
@@ -57,7 +66,7 @@ Result(u32) AESBlockEncryptor_encrypt(AESBlockEncryptor* ptr,
|
||||
__Array_writeNext(&dst, ptr->buf, sizeof(header));
|
||||
|
||||
// encrypt full AESBlockEncryptor buffers
|
||||
while(src.size > __AES_BUFFER_SIZE){
|
||||
while(src.len > __AES_BUFFER_SIZE){
|
||||
__Array_readNext(ptr->buf, &src, __AES_BUFFER_SIZE);
|
||||
ptr->enc_class->run((void*)ptr->enc_keys,
|
||||
ptr->iv,
|
||||
@@ -66,10 +75,10 @@ Result(u32) AESBlockEncryptor_encrypt(AESBlockEncryptor* ptr,
|
||||
}
|
||||
|
||||
// encrypt buffer with remaining data
|
||||
if(src.size > 0){
|
||||
memcpy(ptr->buf, src.data, src.size);
|
||||
u32 src_size_padded = src.size + header.padding_size;
|
||||
memset(ptr->buf + src.size, 0, header.padding_size);
|
||||
if(src.len > 0){
|
||||
memcpy(ptr->buf, src.data, src.len);
|
||||
memset(ptr->buf + src.len, 0, header.padding_size);
|
||||
u32 src_size_padded = src.len + header.padding_size;
|
||||
ptr->enc_class->run((void*)ptr->enc_keys,
|
||||
ptr->iv,
|
||||
ptr->buf, src_size_padded);
|
||||
@@ -87,25 +96,25 @@ Result(u32) AESBlockEncryptor_encrypt(AESBlockEncryptor* ptr,
|
||||
void AESBlockDecryptor_construct(AESBlockDecryptor* ptr,
|
||||
Array(u8) key, const br_block_cbcdec_class* dec_class)
|
||||
{
|
||||
assert(key.size == 16 || key.size == 24 || key.size == 32);
|
||||
|
||||
ptr->dec_class = dec_class;
|
||||
ptr->dec_class->init((void*)ptr->dec_keys, key.data, key.size);
|
||||
AESBlockDecryptor_changeKey(ptr, key);
|
||||
}
|
||||
|
||||
void AESBlockDecryptor_changeKey(AESBlockDecryptor* ptr, Array(u8) key)
|
||||
{
|
||||
assert(key.size == 16 || key.size == 24 || key.size == 32);
|
||||
ptr->dec_class->init((void*)ptr->dec_keys, key.data, key.size);
|
||||
assert(key.len == 16 || key.len == 24 || key.len == 32);
|
||||
ptr->dec_class->init((void*)ptr->dec_keys, key.data, key.len);
|
||||
__calcKeyCheckSum(key, ptr->key_checksum);
|
||||
}
|
||||
|
||||
Result(u32) AESBlockDecryptor_decrypt(AESBlockDecryptor* ptr,
|
||||
Array(u8) src, Array(u8) dst)
|
||||
{
|
||||
Deferral(4);
|
||||
try_assert(src.size >= AESBlockEncryptor_calcDstSize(0));
|
||||
try_assert(src.size % 16 == 0 && "src must be array of 16-byte blocks");
|
||||
try_assert(dst.size >= src.size);
|
||||
u32 overhead_size = AESBlockEncryptor_calcDstSize(0);
|
||||
try_assert(src.len >= overhead_size);
|
||||
try_assert(src.len % 16 == 0 && "src must be array of 16-byte blocks");
|
||||
try_assert(dst.len >= src.len - overhead_size);
|
||||
|
||||
// read IV from the beginning of src
|
||||
__Array_readNext(ptr->iv, &src, __AES_BLOCK_IV_SIZE);
|
||||
@@ -115,13 +124,19 @@ Result(u32) AESBlockDecryptor_decrypt(AESBlockDecryptor* ptr,
|
||||
__Array_readNext((void*)&header, &src, sizeof(header));
|
||||
// decrypt header
|
||||
ptr->dec_class->run((void*)ptr->dec_keys, ptr->iv, &header, sizeof(header));
|
||||
|
||||
// validate decrypted data
|
||||
if(memcmp(header.key_checksum, ptr->key_checksum, __AES_BLOCK_KEY_CHECKSUM_SIZE) != 0){
|
||||
Return RESULT_ERROR_LITERAL("decrypted data is invalid or key is wrong");
|
||||
}
|
||||
|
||||
// size of decrypted data without padding
|
||||
u32 decrypted_size = src.size - header.padding_size;
|
||||
const u32 src_size_padded = src.size;
|
||||
src.size = decrypted_size;
|
||||
try_assert(src.len >= header.padding_size && "invalid padding size");
|
||||
u32 decrypted_size = src.len - header.padding_size;
|
||||
src.len = decrypted_size;
|
||||
|
||||
// decrypt full buffers
|
||||
while(src.size > __AES_BUFFER_SIZE){
|
||||
while(src.len > __AES_BUFFER_SIZE){
|
||||
__Array_readNext(ptr->buf, &src, __AES_BUFFER_SIZE);
|
||||
ptr->dec_class->run((void*)ptr->dec_keys,
|
||||
ptr->iv,
|
||||
@@ -130,12 +145,14 @@ Result(u32) AESBlockDecryptor_decrypt(AESBlockDecryptor* ptr,
|
||||
}
|
||||
|
||||
// decrypt buffer with remaining data
|
||||
if(src.size > 0){
|
||||
memcpy(ptr->buf, src.data, src.size);
|
||||
if(src.len > 0){
|
||||
memcpy(ptr->buf, src.data, src.len);
|
||||
memset(ptr->buf + src.len, 0, header.padding_size);
|
||||
u32 src_size_padded = src.len + header.padding_size;
|
||||
ptr->dec_class->run((void*)ptr->dec_keys,
|
||||
ptr->iv,
|
||||
ptr->buf, src_size_padded);
|
||||
memcpy(dst.data, ptr->buf, src.size);
|
||||
memcpy(dst.data, ptr->buf, src.len);
|
||||
}
|
||||
|
||||
Return RESULT_VALUE(u, decrypted_size);
|
||||
@@ -149,56 +166,64 @@ Result(u32) AESBlockDecryptor_decrypt(AESBlockDecryptor* ptr,
|
||||
void AESStreamEncryptor_construct(AESStreamEncryptor* ptr,
|
||||
Array(u8) key, const br_block_ctr_class* ctr_class)
|
||||
{
|
||||
assert(key.size == 16 || key.size == 24 || key.size == 32);
|
||||
|
||||
ptr->ctr_class = ctr_class;
|
||||
ptr->ctr_class->init((void*)ptr->ctr_keys, key.data, key.size);
|
||||
AESStreamEncryptor_changeKey(ptr, key);
|
||||
ptr->block_counter = 0;
|
||||
|
||||
br_hmac_drbg_context rng_ctx;
|
||||
rng_ctx.vtable = &br_hmac_drbg_vtable;
|
||||
rng_init_sha256_seedFromSystem(&rng_ctx.vtable);
|
||||
br_hmac_drbg_generate(&rng_ctx, ptr->iv, __AES_STREAM_IV_SIZE);
|
||||
|
||||
ptr->block_counter = 0;
|
||||
}
|
||||
|
||||
void AESStreamEncryptor_changeKey(AESStreamEncryptor* ptr, Array(u8) key)
|
||||
{
|
||||
assert(key.size == 16 || key.size == 24 || key.size == 32);
|
||||
ptr->ctr_class->init((void*)ptr->ctr_keys, key.data, key.size);
|
||||
assert(key.len == 16 || key.len == 24 || key.len == 32);
|
||||
ptr->ctr_class->init((void*)ptr->ctr_keys, key.data, key.len);
|
||||
__calcKeyCheckSum(key, ptr->key_checksum);
|
||||
}
|
||||
|
||||
Result(u32) AESStreamEncryptor_encrypt(AESStreamEncryptor* ptr,
|
||||
Array(u8) src, Array(u8) dst)
|
||||
{
|
||||
Deferral(4);
|
||||
u32 encrypted_size = AESStreamEncryptor_calcDstSize(src.size);
|
||||
try_assert(dst.size >= encrypted_size);
|
||||
|
||||
// if it is the beginning of the stream, write IV
|
||||
u32 encrypted_size = src.len;
|
||||
// if it is the beginning of the stream,
|
||||
if(ptr->block_counter == 0){
|
||||
// write IV generated during initialization
|
||||
__Array_writeNext(&dst, ptr->iv, __AES_STREAM_IV_SIZE);
|
||||
encrypted_size = AESStreamEncryptor_calcDstSize(encrypted_size);
|
||||
|
||||
// encrypt checksum
|
||||
u8 key_checksum[__AES_BLOCK_KEY_CHECKSUM_SIZE];
|
||||
memcpy(key_checksum, ptr->key_checksum, __AES_BLOCK_KEY_CHECKSUM_SIZE);
|
||||
ptr->block_counter = ptr->ctr_class->run((void*)ptr->ctr_keys,
|
||||
ptr->iv, ptr->block_counter,
|
||||
key_checksum, __AES_BLOCK_KEY_CHECKSUM_SIZE);
|
||||
// write checksum to dst
|
||||
__Array_writeNext(&dst, key_checksum, __AES_BLOCK_KEY_CHECKSUM_SIZE);
|
||||
}
|
||||
try_assert(dst.len >= encrypted_size);
|
||||
|
||||
// encrypt full buffers
|
||||
while(src.size > __AES_BUFFER_SIZE){
|
||||
while(src.len > __AES_BUFFER_SIZE){
|
||||
__Array_readNext(ptr->buf, &src, __AES_BUFFER_SIZE);
|
||||
ptr->ctr_class->run((void*)ptr->ctr_keys,
|
||||
ptr->block_counter = ptr->ctr_class->run((void*)ptr->ctr_keys,
|
||||
ptr->iv, ptr->block_counter,
|
||||
ptr->buf, __AES_BUFFER_SIZE);
|
||||
__Array_writeNext(&dst, ptr->buf, __AES_BUFFER_SIZE);
|
||||
}
|
||||
|
||||
// encrypt remaining data
|
||||
if(src.size > 0){
|
||||
memcpy(ptr->buf, src.data, src.size);
|
||||
ptr->ctr_class->run((void*)ptr->ctr_keys,
|
||||
if(src.len > 0){
|
||||
memcpy(ptr->buf, src.data, src.len);
|
||||
ptr->block_counter = ptr->ctr_class->run((void*)ptr->ctr_keys,
|
||||
ptr->iv, ptr->block_counter,
|
||||
ptr->buf, src.size);
|
||||
memcpy(dst.data, ptr->buf, src.size);
|
||||
ptr->buf, src.len);
|
||||
memcpy(dst.data, ptr->buf, src.len);
|
||||
}
|
||||
|
||||
ptr->block_counter++;
|
||||
Return RESULT_VALUE(u, encrypted_size);
|
||||
}
|
||||
|
||||
@@ -210,18 +235,16 @@ Result(u32) AESStreamEncryptor_encrypt(AESStreamEncryptor* ptr,
|
||||
void AESStreamDecryptor_construct(AESStreamDecryptor* ptr,
|
||||
Array(u8) key, const br_block_ctr_class* ctr_class)
|
||||
{
|
||||
assert(key.size == 16 || key.size == 24 || key.size == 32);
|
||||
|
||||
ptr->ctr_class = ctr_class;
|
||||
ptr->ctr_class->init((void*)ptr->ctr_keys, key.data, key.size);
|
||||
|
||||
AESStreamDecryptor_changeKey(ptr, key);
|
||||
ptr->block_counter = 0;
|
||||
}
|
||||
|
||||
void AESStreamDecryptor_changeKey(AESStreamDecryptor* ptr, Array(u8) key)
|
||||
{
|
||||
assert(key.size == 16 || key.size == 24 || key.size == 32);
|
||||
ptr->ctr_class->init((void*)ptr->ctr_keys, key.data, key.size);
|
||||
assert(key.len == 16 || key.len == 24 || key.len == 32);
|
||||
ptr->ctr_class->init((void*)ptr->ctr_keys, key.data, key.len);
|
||||
__calcKeyCheckSum(key, ptr->key_checksum);
|
||||
}
|
||||
|
||||
Result(u32) AESStreamDecryptor_decrypt(AESStreamDecryptor* ptr,
|
||||
@@ -229,32 +252,44 @@ Result(u32) AESStreamDecryptor_decrypt(AESStreamDecryptor* ptr,
|
||||
{
|
||||
Deferral(4);
|
||||
|
||||
// if it is the beginning of the stream, read IV
|
||||
// if it is the beginning of the stream
|
||||
if(ptr->block_counter == 0){
|
||||
// read random IV
|
||||
__Array_readNext(ptr->iv, &src, __AES_STREAM_IV_SIZE);
|
||||
|
||||
// read checksum
|
||||
u8 key_checksum[__AES_BLOCK_KEY_CHECKSUM_SIZE];
|
||||
__Array_readNext(key_checksum, &src, __AES_BLOCK_KEY_CHECKSUM_SIZE);
|
||||
// decrypt checksum
|
||||
ptr->block_counter = ptr->ctr_class->run((void*)ptr->ctr_keys,
|
||||
ptr->iv, ptr->block_counter,
|
||||
key_checksum, __AES_BLOCK_KEY_CHECKSUM_SIZE);
|
||||
// validate decrypted data
|
||||
if(memcmp(key_checksum, ptr->key_checksum, __AES_BLOCK_KEY_CHECKSUM_SIZE) != 0){
|
||||
Return RESULT_ERROR_LITERAL("decrypted data is invalid or key is wrong");
|
||||
}
|
||||
}
|
||||
// size without IV
|
||||
u32 decrypted_size = src.size;
|
||||
try_assert(dst.size >= decrypted_size);
|
||||
u32 decrypted_size = src.len;
|
||||
try_assert(dst.len >= decrypted_size);
|
||||
|
||||
// decrypt full buffers
|
||||
while(src.size > __AES_BUFFER_SIZE){
|
||||
while(src.len > __AES_BUFFER_SIZE){
|
||||
__Array_readNext(ptr->buf, &src, __AES_BUFFER_SIZE);
|
||||
ptr->ctr_class->run((void*)ptr->ctr_keys,
|
||||
ptr->block_counter = ptr->ctr_class->run((void*)ptr->ctr_keys,
|
||||
ptr->iv, ptr->block_counter,
|
||||
ptr->buf, __AES_BUFFER_SIZE);
|
||||
__Array_writeNext(&dst, ptr->buf, __AES_BUFFER_SIZE);
|
||||
}
|
||||
|
||||
// decrypt remaining data
|
||||
if(src.size > 0){
|
||||
memcpy(ptr->buf, src.data, src.size);
|
||||
ptr->ctr_class->run((void*)ptr->ctr_keys,
|
||||
if(src.len > 0){
|
||||
memcpy(ptr->buf, src.data, src.len);
|
||||
ptr->block_counter = ptr->ctr_class->run((void*)ptr->ctr_keys,
|
||||
ptr->iv, ptr->block_counter,
|
||||
ptr->buf, src.size);
|
||||
memcpy(dst.data, ptr->buf, src.size);
|
||||
ptr->buf, src.len);
|
||||
memcpy(dst.data, ptr->buf, src.len);
|
||||
}
|
||||
|
||||
ptr->block_counter++;
|
||||
Return RESULT_VALUE(u, decrypted_size);
|
||||
}
|
||||
|
||||
@@ -1,6 +1,7 @@
|
||||
#pragma once
|
||||
#include "tlibc/collections/Array.h"
|
||||
#include "tlibc/errors.h"
|
||||
#include "tlibc/magic.h"
|
||||
#include "bearssl_block.h"
|
||||
#include "cryptography.h"
|
||||
|
||||
@@ -15,7 +16,9 @@
|
||||
#define AESStream_DEFAULT_CLASS (&br_aes_big_ctr_vtable)
|
||||
|
||||
|
||||
#define __AES_BLOCK_KEY_CHECKSUM_SIZE br_sha256_SIZE
|
||||
typedef struct EncryptedBlockHeader {
|
||||
u8 key_checksum[__AES_BLOCK_KEY_CHECKSUM_SIZE];
|
||||
u8 padding_size;
|
||||
} ATTRIBUTE_ALIGNED(16) EncryptedBlockHeader;
|
||||
|
||||
@@ -32,6 +35,7 @@ typedef struct AESBlockEncryptor {
|
||||
u8 enc_keys[sizeof(br_aes_big_cbcenc_keys)];
|
||||
u8 buf[__AES_BUFFER_SIZE];
|
||||
u8 iv[__AES_BLOCK_IV_SIZE];
|
||||
u8 key_checksum[__AES_BLOCK_KEY_CHECKSUM_SIZE];
|
||||
br_hmac_drbg_context rng_ctx;
|
||||
} AESBlockEncryptor;
|
||||
|
||||
@@ -44,7 +48,7 @@ void AESBlockEncryptor_changeKey(AESBlockEncryptor* ptr, Array(u8) key);
|
||||
|
||||
/// @brief Encrypts a complete message. For part-by-part encryption use AESStreamEncryptor.
|
||||
/// @param src array of any size
|
||||
/// @param dst array of size >= AESBlockEncryptor_calcDstSize(src.size)
|
||||
/// @param dst array of size >= AESBlockEncryptor_calcDstSize(src.len)
|
||||
/// @return size of encrypted data
|
||||
Result(u32) AESBlockEncryptor_encrypt(AESBlockEncryptor* ptr, Array(u8) src, Array(u8) dst);
|
||||
|
||||
@@ -59,6 +63,7 @@ typedef struct AESBlockDecryptor {
|
||||
u8 dec_keys[sizeof(br_aes_big_cbcdec_keys)];
|
||||
u8 buf[__AES_BUFFER_SIZE];
|
||||
u8 iv[__AES_BLOCK_IV_SIZE];
|
||||
u8 key_checksum[__AES_BLOCK_KEY_CHECKSUM_SIZE];
|
||||
} AESBlockDecryptor;
|
||||
|
||||
/// @param key supported sizes: 16, 24, 32
|
||||
@@ -70,7 +75,7 @@ void AESBlockDecryptor_changeKey(AESBlockDecryptor* ptr, Array(u8) key);
|
||||
|
||||
/// @brief Decrypts a complete message. For part-by-part decryption use AESStreamEncryptor.
|
||||
/// @param src array of size at least AESBlockEncryptor_calcDstSize(0). Size must be multiple of 16.
|
||||
/// @param dst array of size >= src.size
|
||||
/// @param dst array of size >= src.len
|
||||
/// @return size of decrypted data
|
||||
Result(u32) AESBlockDecryptor_decrypt(AESBlockDecryptor* ptr, Array(u8) src, Array(u8) dst);
|
||||
|
||||
@@ -85,6 +90,7 @@ typedef struct AESStreamEncryptor {
|
||||
u8 ctr_keys[sizeof(br_aes_big_ctr_keys)];
|
||||
u8 buf[__AES_BUFFER_SIZE];
|
||||
u8 iv[__AES_STREAM_IV_SIZE];
|
||||
u8 key_checksum[__AES_BLOCK_KEY_CHECKSUM_SIZE];
|
||||
u32 block_counter;
|
||||
} AESStreamEncryptor;
|
||||
|
||||
@@ -97,11 +103,11 @@ void AESStreamEncryptor_construct(AESStreamEncryptor* ptr, Array(u8) key, const
|
||||
void AESStreamEncryptor_changeKey(AESStreamEncryptor* ptr, Array(u8) key);
|
||||
|
||||
/// use this only at the beginning of the stream
|
||||
#define AESStreamEncryptor_calcDstSize(src_size) (src_size + __AES_STREAM_IV_SIZE)
|
||||
#define AESStreamEncryptor_calcDstSize(src_size) (__AES_STREAM_IV_SIZE + __AES_BLOCK_KEY_CHECKSUM_SIZE + src_size)
|
||||
|
||||
/// @brief If ptr->block_counter == 0, writes random IV to `dst`. After that writes encrypted data to dst.
|
||||
/// @param src array of any size
|
||||
/// @param dst array of size >= AESStreamEncryptor_calcDstSize(src.size)
|
||||
/// @param dst array of size >= `AESStreamEncryptor_calcDstSize(src.len)` for first block and `src.len `for other blocks
|
||||
/// @return size of encrypted data
|
||||
Result(u32) AESStreamEncryptor_encrypt(AESStreamEncryptor* ptr, Array(u8) src, Array(u8) dst);
|
||||
|
||||
@@ -114,6 +120,7 @@ typedef struct AESStreamDecryptor {
|
||||
u8 ctr_keys[sizeof(br_aes_big_ctr_keys)];
|
||||
u8 buf[__AES_BUFFER_SIZE];
|
||||
u8 iv[__AES_STREAM_IV_SIZE];
|
||||
u8 key_checksum[__AES_BLOCK_KEY_CHECKSUM_SIZE];
|
||||
u32 block_counter;
|
||||
} AESStreamDecryptor;
|
||||
|
||||
@@ -127,6 +134,6 @@ void AESStreamDecryptor_changeKey(AESStreamDecryptor* ptr, Array(u8) key);
|
||||
|
||||
/// @brief Reads IV from `src`, then decrypts data and writes it to dst
|
||||
/// @param src array of any size
|
||||
/// @param dst array of size >= src.size
|
||||
/// @param dst array of size >= src.len
|
||||
/// @return size of decrypted data
|
||||
Result(u32) AESStreamDecryptor_decrypt(AESStreamDecryptor* ptr, Array(u8) src, Array(u8) dst);
|
||||
|
||||
@@ -1,7 +1,5 @@
|
||||
#include "RSA.h"
|
||||
#include <assert.h>
|
||||
#include "bearssl_x509.h"
|
||||
#include "bearssl_pem.h"
|
||||
#include "tlibc/base64.h"
|
||||
|
||||
// https://crypto.stackexchange.com/questions/3110/impacts-of-not-using-rsa-exponent-of-65537
|
||||
@@ -25,7 +23,7 @@ Result(void) RSA_generateKeyPair(u32 key_size,
|
||||
|
||||
success = br_rsa_i31_keygen(rng_vtable_ptr, sk, sk_buf, pk, pk_buf, key_size, DEFAULT_PUBLIC_EXPONENT);
|
||||
if(!success){
|
||||
Return RESULT_ERROR("br_rsa_i31_keygen() failed", false);
|
||||
Return RESULT_ERROR_LITERAL("br_rsa_i31_keygen() failed");
|
||||
}
|
||||
|
||||
Return RESULT_VOID;
|
||||
@@ -46,7 +44,7 @@ Result(void) RSA_generateKeyPairFromPassword(u32 key_size,
|
||||
{
|
||||
Deferral(4);
|
||||
br_hmac_drbg_context password_based_rng = { .vtable = &br_hmac_drbg_vtable };
|
||||
br_hmac_drbg_init(&password_based_rng, &br_sha256_vtable, password.data, password.size);
|
||||
br_hmac_drbg_init(&password_based_rng, &br_sha256_vtable, password.data, password.len);
|
||||
try_void(RSA_generateKeyPair(key_size, sk, pk, &password_based_rng.vtable));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
@@ -58,7 +56,7 @@ Result(void) RSA_computePublicKey(const br_rsa_private_key* sk, br_rsa_public_ke
|
||||
|
||||
size_t modulus_size = compute_modulus(NULL, sk);
|
||||
if (modulus_size == 0) {
|
||||
Return RESULT_ERROR("compute_modulus", false);
|
||||
Return RESULT_ERROR_LITERAL("compute_modulus");
|
||||
}
|
||||
void* modulus = malloc(modulus_size);
|
||||
bool success = false;
|
||||
@@ -67,12 +65,12 @@ Result(void) RSA_computePublicKey(const br_rsa_private_key* sk, br_rsa_public_ke
|
||||
free(modulus)
|
||||
);
|
||||
if (compute_modulus(modulus, sk) != modulus_size) {
|
||||
Return RESULT_ERROR("compute_modulus", false);
|
||||
Return RESULT_ERROR_LITERAL("compute_modulus");
|
||||
}
|
||||
|
||||
u32 pubexp_little_endian = compute_pubexp(sk);
|
||||
if (pubexp_little_endian == 0) {
|
||||
Return RESULT_ERROR("compute_pubexp", false);
|
||||
Return RESULT_ERROR_LITERAL("compute_pubexp");
|
||||
}
|
||||
u8 pubexp_big_endian[4];
|
||||
pubexp_big_endian[0] = pubexp_little_endian >> 24;
|
||||
@@ -115,7 +113,7 @@ Result(void) RSA_parsePublicKey_base64(cstr src, br_rsa_public_key* pk){
|
||||
Deferral(4);
|
||||
u32 n_bitlen = 0;
|
||||
if(sscanf(src, "RSA-Public-%u:", &n_bitlen) != 1){
|
||||
Return RESULT_ERROR("can't parse key size", false);
|
||||
Return RESULT_ERROR_LITERAL("can't parse key size");
|
||||
}
|
||||
u32 key_buffer_size = BR_RSA_KBUF_PUB_SIZE(n_bitlen);
|
||||
pk->n = malloc(key_buffer_size);
|
||||
@@ -125,18 +123,18 @@ Result(void) RSA_parsePublicKey_base64(cstr src, br_rsa_public_key* pk){
|
||||
str src_str = str_from_cstr(src);
|
||||
u32 offset = str_seekChar(src_str, ':', 10) + 1;
|
||||
if(offset == 0){
|
||||
Return RESULT_ERROR("missing ':' before key data", false);
|
||||
Return RESULT_ERROR_LITERAL("missing ':' before key data");
|
||||
}
|
||||
str key_base64_str = src_str;
|
||||
key_base64_str.data += offset;
|
||||
key_base64_str.size -= offset;
|
||||
u32 decoded_size = base64_decodedSize(key_base64_str.data, key_base64_str.size);
|
||||
key_base64_str.len -= offset;
|
||||
u32 decoded_size = base64_decodedSize(key_base64_str.data, key_base64_str.len);
|
||||
if(decoded_size != key_buffer_size){
|
||||
Return RESULT_ERROR_FMT("decoded key size is %u, must be %u", decoded_size, key_buffer_size);
|
||||
}
|
||||
decoded_size = base64_decode(key_base64_str.data, key_base64_str.size, pk->n);
|
||||
decoded_size = base64_decode(key_base64_str.data, key_base64_str.len, pk->n);
|
||||
if(decoded_size != key_buffer_size){
|
||||
Return RESULT_ERROR("key decoding failed", false);
|
||||
Return RESULT_ERROR_LITERAL("key decoding failed");
|
||||
}
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
@@ -145,7 +143,7 @@ Result(void) RSA_parsePrivateKey_base64(cstr src, br_rsa_private_key* sk){
|
||||
Deferral(4);
|
||||
u32 n_bitlen = 0;
|
||||
if(sscanf(src, "RSA-Private-%u:", &n_bitlen) != 1){
|
||||
Return RESULT_ERROR("can't parse key size", false);
|
||||
Return RESULT_ERROR_LITERAL("can't parse key size");
|
||||
}
|
||||
sk->n_bitlen = n_bitlen;
|
||||
u32 key_buffer_size = BR_RSA_KBUF_PRIV_SIZE(n_bitlen);
|
||||
@@ -159,18 +157,18 @@ Result(void) RSA_parsePrivateKey_base64(cstr src, br_rsa_private_key* sk){
|
||||
str src_str = str_from_cstr(src);
|
||||
u32 offset = str_seekChar(src_str, ':', 10) + 1;
|
||||
if(offset == 0){
|
||||
Return RESULT_ERROR("missing ':' before key data", false);
|
||||
Return RESULT_ERROR_LITERAL("missing ':' before key data");
|
||||
}
|
||||
str key_base64_str = src_str;
|
||||
key_base64_str.data += offset;
|
||||
key_base64_str.size -= offset;
|
||||
u32 decoded_size = base64_decodedSize(key_base64_str.data, key_base64_str.size);
|
||||
key_base64_str.len -= offset;
|
||||
u32 decoded_size = base64_decodedSize(key_base64_str.data, key_base64_str.len);
|
||||
if(decoded_size != key_buffer_size){
|
||||
Return RESULT_ERROR_FMT("decoded key size is %u, must be %u", decoded_size, key_buffer_size);
|
||||
}
|
||||
decoded_size = base64_decode(key_base64_str.data, key_base64_str.size, sk->p);
|
||||
decoded_size = base64_decode(key_base64_str.data, key_base64_str.len, sk->p);
|
||||
if(decoded_size != key_buffer_size){
|
||||
Return RESULT_ERROR("key decoding failed", false);
|
||||
Return RESULT_ERROR_LITERAL("key decoding failed");
|
||||
}
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
@@ -189,23 +187,23 @@ void RSAEncryptor_construct(RSAEncryptor* ptr, const br_rsa_public_key* pk){
|
||||
Result(u32) RSAEncryptor_encrypt(RSAEncryptor* ptr, Array(u8) src, Array(u8) dst){
|
||||
u32 key_size_bytes = ptr->pk->nlen;
|
||||
const u32 max_src_size = RSAEncryptor_calcMaxSrcSize(key_size_bytes * 8, 256);
|
||||
if(src.size > max_src_size){
|
||||
return RESULT_ERROR_FMT("src.size (%u) must be <= RSAEncryptor_calcMaxSrcSize() (%u)",
|
||||
src.size, max_src_size);
|
||||
if(src.len > max_src_size){
|
||||
return RESULT_ERROR_FMT("src.len (%u) must be <= RSAEncryptor_calcMaxSrcSize() (%u)",
|
||||
src.len, max_src_size);
|
||||
}
|
||||
if(dst.size < key_size_bytes){
|
||||
return RESULT_ERROR_FMT("dst.size (%u) must be >= key length in bytes (%u)",
|
||||
dst.size, key_size_bytes);
|
||||
if(dst.len < key_size_bytes){
|
||||
return RESULT_ERROR_FMT("dst.len (%u) must be >= key length in bytes (%u)",
|
||||
dst.len, key_size_bytes);
|
||||
}
|
||||
size_t sz = br_rsa_i31_oaep_encrypt(
|
||||
&ptr->rng.vtable, &br_sha256_vtable,
|
||||
NULL, 0,
|
||||
ptr->pk,
|
||||
dst.data, dst.size,
|
||||
src.data, src.size);
|
||||
dst.data, dst.len,
|
||||
src.data, src.len);
|
||||
|
||||
if(sz == 0){
|
||||
return RESULT_ERROR("RSA encryption failed", false);
|
||||
return RESULT_ERROR_LITERAL("RSA encryption failed");
|
||||
}
|
||||
return RESULT_VALUE(u, sz);
|
||||
}
|
||||
@@ -221,12 +219,12 @@ void RSADecryptor_construct(RSADecryptor* ptr, const br_rsa_private_key* sk){
|
||||
|
||||
Result(u32) RSADecryptor_decrypt(RSADecryptor* ptr, Array(u8) buffer){
|
||||
u32 key_size_bits = ptr->sk->n_bitlen;
|
||||
if(buffer.size != key_size_bits/8){
|
||||
return RESULT_ERROR_FMT("buffer.size (%u) must be == key length in bytes (%u)",
|
||||
buffer.size, key_size_bits/8);
|
||||
if(buffer.len != key_size_bits/8){
|
||||
return RESULT_ERROR_FMT("buffer.len (%u) must be == key length in bytes (%u)",
|
||||
buffer.len, key_size_bits/8);
|
||||
}
|
||||
|
||||
size_t sz = buffer.size;
|
||||
size_t sz = buffer.len;
|
||||
size_t r = br_rsa_i31_oaep_decrypt(
|
||||
&br_sha256_vtable,
|
||||
NULL, 0,
|
||||
@@ -234,7 +232,7 @@ Result(u32) RSADecryptor_decrypt(RSADecryptor* ptr, Array(u8) buffer){
|
||||
buffer.data, &sz);
|
||||
|
||||
if(r == 0){
|
||||
return RESULT_ERROR("RSA encryption failed", false);
|
||||
return RESULT_ERROR_LITERAL("RSA encryption failed");
|
||||
}
|
||||
return RESULT_VALUE(u, sz);
|
||||
}
|
||||
|
||||
@@ -1,8 +1,9 @@
|
||||
#pragma once
|
||||
#include "tcp-chat.h"
|
||||
#include "tlibc/collections/Array.h"
|
||||
#include "tlibc/errors.h"
|
||||
#include "tlibc/collections/Array_impl/Array_u8.h"
|
||||
#include "bearssl_rand.h"
|
||||
#include "common_constants.h"
|
||||
#include "bearssl_hash.h"
|
||||
|
||||
//////////////////////////////////////////////////////////////////////////////
|
||||
// //
|
||||
@@ -12,9 +13,10 @@
|
||||
|
||||
/// @brief hashes password multiple times using its own hash as salt
|
||||
/// @param password some byte array
|
||||
/// @param salt some byte array
|
||||
/// @param out_buffer u8[PASSWORD_HASH_SIZE]
|
||||
/// @param rounds number of rounds
|
||||
void hash_password(Array(u8) password, u8* out_buffer, i32 rounds);
|
||||
void hash_password(Array(u8) password, Array(u8) salt, u8* out_buffer, i32 rounds);
|
||||
#define PASSWORD_HASH_LVL_ROUNDS 1e5
|
||||
|
||||
//////////////////////////////////////////////////////////////////////////////
|
||||
@@ -26,6 +28,7 @@ void hash_password(Array(u8) password, u8* out_buffer, i32 rounds);
|
||||
/// @brief Initialize prng context with sha256 hashing algorithm
|
||||
/// and seed from system-provided cryptographic random bytes source.
|
||||
/// @param rng_vtable_ptr pointer to vtable field in prng context. The field must be initialized.
|
||||
///
|
||||
/// EXAMPLE:
|
||||
/// ```
|
||||
/// br_hmac_drbg_context rng_ctx = { .vtable = &br_hmac_drbg_vtable };
|
||||
@@ -35,6 +38,7 @@ void rng_init_sha256_seedFromSystem(const br_prng_class** rng_vtable_ptr);
|
||||
|
||||
/// @brief Initialize prng context with sha256 hashing algorithm and seed from CLOCK_REALTIME.
|
||||
/// @param rng_vtable_ptr pointer to vtable field in prng context. The field must be initialized.
|
||||
///
|
||||
/// EXAMPLE:
|
||||
/// ```
|
||||
/// br_hmac_drbg_context rng_ctx = { .vtable = &br_hmac_drbg_vtable };
|
||||
|
||||
@@ -1,15 +1,15 @@
|
||||
#include "cryptography.h"
|
||||
#include "bearssl_hash.h"
|
||||
#include "assert.h"
|
||||
|
||||
void hash_password(Array(u8) password, u8* out_buffer, i32 iterations){
|
||||
void hash_password(Array(u8) password, Array(u8) salt, u8* out_buffer, i32 iterations){
|
||||
assert(PASSWORD_HASH_SIZE == br_sha256_SIZE);;
|
||||
memset(out_buffer, 0, br_sha256_SIZE);
|
||||
br_sha256_context sha256_ctx;
|
||||
br_sha256_init(&sha256_ctx);
|
||||
|
||||
for(i32 i = 0; i < iterations; i++){
|
||||
br_sha256_update(&sha256_ctx, password.data, password.size);
|
||||
br_sha256_update(&sha256_ctx, password.data, password.len);
|
||||
br_sha256_update(&sha256_ctx, salt.data, salt.len);
|
||||
br_sha256_out(&sha256_ctx, out_buffer);
|
||||
br_sha256_update(&sha256_ctx, out_buffer, PASSWORD_HASH_SIZE);
|
||||
}
|
||||
|
||||
408
src/db/idb.c
408
src/db/idb.c
@@ -1,408 +0,0 @@
|
||||
#include "idb.h"
|
||||
#include "magic.h"
|
||||
#include "tlibc/filesystem.h"
|
||||
#include "tlibc/collections/HashMap.h"
|
||||
#include "cryptography/AES.h"
|
||||
#include <pthread.h>
|
||||
|
||||
typedef struct TableFileHeader {
|
||||
Magic32 magic;
|
||||
u16 version;
|
||||
bool _dirty_bit;
|
||||
bool encrypted;
|
||||
u32 row_size;
|
||||
} ATTRIBUTE_ALIGNED(256) TableFileHeader;
|
||||
|
||||
typedef struct Table {
|
||||
TableFileHeader header;
|
||||
IncrementalDB* db;
|
||||
str name;
|
||||
str table_file_path;
|
||||
str changes_file_path;
|
||||
FILE* table_file;
|
||||
FILE* changes_file;
|
||||
pthread_mutex_t mutex;
|
||||
u64 row_count;
|
||||
AESBlockEncryptor enc;
|
||||
AESBlockDecryptor dec;
|
||||
Array(u8) enc_buf;
|
||||
} Table;
|
||||
|
||||
typedef struct IncrementalDB {
|
||||
str db_dir;
|
||||
Array(u8) aes_key;
|
||||
HashMap(Table**) tables_map;
|
||||
pthread_mutex_t mutex;
|
||||
} IncrementalDB;
|
||||
|
||||
static const Magic32 TABLE_FILE_MAGIC = { .bytes = { 'I', 'D', 'B', 't' } };
|
||||
|
||||
|
||||
void Table_close(Table* t){
|
||||
fclose(t->table_file);
|
||||
fclose(t->changes_file);
|
||||
free(t->name.data);
|
||||
free(t->table_file_path.data);
|
||||
free(t->changes_file_path.data);
|
||||
pthread_mutex_destroy(&t->mutex);
|
||||
free(t->enc_buf.data);
|
||||
free(t);
|
||||
}
|
||||
|
||||
// element destructor for HashMap(Table*)
|
||||
static void TablePtr_free(void* t_ptr_ptr){
|
||||
Table_close(*(Table**)t_ptr_ptr);
|
||||
}
|
||||
|
||||
/// @param name must be null-terminated
|
||||
static Result(void) validateTableName(str name){
|
||||
char forbidden_characters[] = { '/', '\\', ':', ';', '?', '"', '\'', '\n', '\r', '\t'};
|
||||
for(u32 i = 0; i < ARRAY_LEN(forbidden_characters); i++) {
|
||||
char c = forbidden_characters[i];
|
||||
if(str_seekChar(name, c, 0) != -1){
|
||||
return RESULT_ERROR_FMT(
|
||||
"Table name '%s' contains forbidden character '%c'",
|
||||
name.data, c);
|
||||
}
|
||||
}
|
||||
|
||||
return RESULT_VOID;
|
||||
}
|
||||
|
||||
static Result(void) Table_readHeader(Table* t){
|
||||
Deferral(4);
|
||||
// seek for start of the file
|
||||
try_void(file_seek(t->table_file, 0, SeekOrigin_Start));
|
||||
// read header
|
||||
try_void(file_readStructsExactly(t->table_file, &t->header, sizeof(t->header), 1));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
static Result(void) Table_writeHeader(Table* t){
|
||||
Deferral(4);
|
||||
// seek for start of the file
|
||||
try_void(file_seek(t->table_file, 0, SeekOrigin_Start));
|
||||
// write header
|
||||
try_void(file_writeStructs(t->table_file, &t->header, sizeof(t->header), 1));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
static Result(void) Table_setDirtyBit(Table* t, bool val){
|
||||
Deferral(4);
|
||||
t->header._dirty_bit = val;
|
||||
try_void(Table_writeHeader(t));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
static Result(bool) Table_getDirtyBit(Table* t){
|
||||
Deferral(4);
|
||||
try_void(Table_readHeader(t));
|
||||
Return RESULT_VALUE(i, t->header._dirty_bit);
|
||||
}
|
||||
|
||||
static u32 Table_calcEncryptedRowSize(Table* t){
|
||||
return AESBlockEncryptor_calcDstSize(t->header.row_size);
|
||||
}
|
||||
|
||||
static Result(void) Table_calculateRowCount(Table* t){
|
||||
Deferral(4);
|
||||
try(i64 file_size, i, file_getSize(t->table_file));
|
||||
i64 data_size = file_size - sizeof(t->header);
|
||||
i64 row_size_in_file = t->header.encrypted
|
||||
? Table_calcEncryptedRowSize(t)
|
||||
: t->header.row_size;
|
||||
if(data_size % row_size_in_file != 0){
|
||||
//TODO: fix table instead of trowing error
|
||||
Return RESULT_ERROR_FMT(
|
||||
"Table '%s' has invalid size. Last row is incomplete.",
|
||||
t->name.data);
|
||||
}
|
||||
|
||||
t->row_count = data_size / row_size_in_file;
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
static Result(void) Table_validateHeader(Table* t){
|
||||
Deferral(4);
|
||||
if(t->header.magic.n != TABLE_FILE_MAGIC.n
|
||||
|| t->header.row_size == 0)
|
||||
{
|
||||
Return RESULT_ERROR_FMT(
|
||||
"Table file '%s' has invalid header",
|
||||
t->table_file_path.data);
|
||||
}
|
||||
|
||||
//TODO: check version
|
||||
|
||||
try(bool dirty_bit, i, Table_getDirtyBit(t));
|
||||
if(dirty_bit){
|
||||
//TODO: handle dirty bit instead of throwing error
|
||||
Return RESULT_ERROR_FMT(
|
||||
"Table file '%s' has dirty bit set",
|
||||
t->table_file_path.data);
|
||||
}
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
static Result(void) Table_validateEncryption(Table* t){
|
||||
bool db_encrypted = t->db->aes_key.size != 0;
|
||||
if(t->header.encrypted && !db_encrypted){
|
||||
return RESULT_ERROR_FMT("Table '%s' is encrypted, but db->aes_key is not set."
|
||||
"Database '%s' is encrypted and must have not-null encryption key.",
|
||||
t->name.data, t->db->db_dir.data);
|
||||
}
|
||||
|
||||
if(!t->header.encrypted && db_encrypted){
|
||||
return RESULT_ERROR_FMT("table '%s' is not encrypted, but db->aes_key is set."
|
||||
"Do not set encryption key for not encrypted database '%s'.",
|
||||
t->name.data, t->db->db_dir.data);
|
||||
}
|
||||
|
||||
return RESULT_VOID;
|
||||
}
|
||||
|
||||
static Result(void) Table_validateRowSize(Table* t, u32 row_size){
|
||||
if(row_size != t->header.row_size){
|
||||
ResultVar(void) error_result = RESULT_ERROR_FMT(
|
||||
"Requested row size (%u) doesn't match saved row size (%u)",
|
||||
row_size, t->header.row_size);
|
||||
return error_result;
|
||||
}
|
||||
|
||||
return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(IncrementalDB*) idb_open(str db_dir, NULLABLE(Array(u8) aes_key)){
|
||||
Deferral(16);
|
||||
try_assert(aes_key.size == 0 || aes_key.size == 16 || aes_key.size == 24 || aes_key.size == 32);
|
||||
|
||||
IncrementalDB* db = (IncrementalDB*)malloc(sizeof(IncrementalDB));
|
||||
// value of *db must be set to zero or behavior of idb_close will be undefined
|
||||
memset(db, 0, sizeof(IncrementalDB));
|
||||
// if object construction fails, destroy incomplete object
|
||||
bool success = false;
|
||||
Defer(if(!success) idb_close(db));
|
||||
|
||||
if(aes_key.size != 0){
|
||||
db->aes_key = Array_copy(aes_key);
|
||||
}
|
||||
|
||||
db->db_dir = str_copy(db_dir);
|
||||
try_void(dir_create(db->db_dir.data));
|
||||
HashMap_construct(&db->tables_map, Table*, TablePtr_free);
|
||||
try_stderrcode(pthread_mutex_init(&db->mutex, NULL));
|
||||
|
||||
success = true;
|
||||
Return RESULT_VALUE(p, db);
|
||||
}
|
||||
|
||||
void idb_close(IncrementalDB* db){
|
||||
free(db->db_dir.data);
|
||||
free(db->aes_key.data);
|
||||
HashMap_destroy(&db->tables_map);
|
||||
pthread_mutex_destroy(&db->mutex);
|
||||
free(db);
|
||||
}
|
||||
|
||||
Result(Table*) idb_getOrCreateTable(IncrementalDB* db, str table_name, u32 row_size){
|
||||
Deferral(16);
|
||||
// db lock
|
||||
try_stderrcode(pthread_mutex_lock(&db->mutex));
|
||||
Defer(pthread_mutex_unlock(&db->mutex));
|
||||
|
||||
Table** tpp = HashMap_tryGetPtr(&db->tables_map, table_name);
|
||||
if(tpp != NULL){
|
||||
Table* existing_table = *tpp;
|
||||
try_void(Table_validateRowSize(existing_table, row_size));
|
||||
Return RESULT_VALUE(p, existing_table);
|
||||
}
|
||||
|
||||
try_void(validateTableName(table_name));
|
||||
|
||||
Table* t = (Table*)malloc(sizeof(Table));
|
||||
// value of *t must be set to zero or behavior of Table_close will be undefined
|
||||
memset(t, 0, sizeof(Table));
|
||||
// if object construction fails, destroy incomplete object
|
||||
bool success = false;
|
||||
Defer(if(!success) Table_close(t));
|
||||
|
||||
t->db = db;
|
||||
try_stderrcode(pthread_mutex_init(&t->mutex, NULL));
|
||||
t->name = str_copy(table_name);
|
||||
t->table_file_path = str_from_cstr(
|
||||
strcat_malloc(db->db_dir.data, path_seps, t->name.data, ".idb-table"));
|
||||
t->changes_file_path = str_from_cstr(
|
||||
strcat_malloc(db->db_dir.data, path_seps, t->name.data, ".idb-changes"));
|
||||
|
||||
bool table_exists = file_exists(t->table_file_path.data);
|
||||
|
||||
// open or create file with table data
|
||||
try(t->table_file, p, file_openOrCreateReadWrite(t->table_file_path.data));
|
||||
// open or create file with backups of updated rows
|
||||
try(t->changes_file, p, file_openOrCreateReadWrite(t->changes_file_path.data));
|
||||
|
||||
if(table_exists){
|
||||
// read table file
|
||||
try_void(Table_readHeader(t));
|
||||
try_void(Table_validateHeader(t));
|
||||
try_void(Table_validateEncryption(t));
|
||||
try_void(Table_validateRowSize(t, row_size));
|
||||
try_void(Table_calculateRowCount(t));
|
||||
}
|
||||
else {
|
||||
// create table file
|
||||
t->header.magic.n = TABLE_FILE_MAGIC.n;
|
||||
t->header.row_size = row_size;
|
||||
t->header.version = IDB_VERSION;
|
||||
t->header.encrypted = db->aes_key.size != 0;
|
||||
t->header._dirty_bit = false;
|
||||
try_void(Table_writeHeader(t));
|
||||
}
|
||||
|
||||
if(t->header.encrypted){
|
||||
AESBlockEncryptor_construct(&t->enc, db->aes_key, AESBlockEncryptor_DEFAULT_CLASS);
|
||||
AESBlockDecryptor_construct(&t->dec, db->aes_key, AESBlockDecryptor_DEFAULT_CLASS);
|
||||
u32 row_size_in_file = Table_calcEncryptedRowSize(t);
|
||||
t->enc_buf = Array_alloc_size(row_size_in_file);
|
||||
}
|
||||
|
||||
if(!HashMap_tryPush(&db->tables_map, t->name, &t)){
|
||||
ResultVar(void) error_result = RESULT_ERROR_FMT(
|
||||
"Table '%s' is already open",
|
||||
t->name.data);
|
||||
Return error_result;
|
||||
}
|
||||
|
||||
success = true;
|
||||
Return RESULT_VALUE(p, t);
|
||||
}
|
||||
|
||||
Result(void) idb_getRows(Table* t, u64 id, void* dst, u64 count){
|
||||
Deferral(8);
|
||||
// table lock
|
||||
try_stderrcode(pthread_mutex_lock(&t->mutex));
|
||||
Defer(pthread_mutex_unlock(&t->mutex));
|
||||
|
||||
if(id + count > t->row_count){
|
||||
Return RESULT_ERROR_FMT(
|
||||
"Can't read "FMT_u64" rows at index "FMT_u64
|
||||
" because table '%s' has only "FMT_u64" rows",
|
||||
count, id, t->name.data, t->row_count);
|
||||
}
|
||||
|
||||
u32 row_size = t->header.row_size;
|
||||
u32 row_size_in_file = t->header.encrypted ? t->enc_buf.size : row_size;
|
||||
i64 file_pos = sizeof(t->header) + id * row_size_in_file;
|
||||
|
||||
// seek for the row position in file
|
||||
try_void(file_seek(t->table_file, file_pos, SeekOrigin_Start));
|
||||
|
||||
// read rows from file
|
||||
for(u64 i = 0; i < count; i++){
|
||||
void* row_ptr = (u8*)dst + row_size * i;
|
||||
void* read_dst = t->header.encrypted ? t->enc_buf.data : row_ptr;
|
||||
try_void(file_readStructsExactly(t->table_file, read_dst, row_size_in_file, 1));
|
||||
if(t->header.encrypted) {
|
||||
try_void(
|
||||
AESBlockDecryptor_decrypt(
|
||||
&t->dec,
|
||||
t->enc_buf,
|
||||
Array_construct_size(row_ptr, row_size)
|
||||
)
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) idb_updateRows(Table* t, u64 id, const void* src, u64 count){
|
||||
Deferral(8);
|
||||
// table lock
|
||||
try_stderrcode(pthread_mutex_lock(&t->mutex));
|
||||
Defer(pthread_mutex_unlock(&t->mutex));
|
||||
|
||||
if(id + count >= t->row_count){
|
||||
Return RESULT_ERROR_FMT(
|
||||
"Can't update "FMT_u64" rows at index "FMT_u64
|
||||
" because table '%s' has only "FMT_u64" rows",
|
||||
count, id, t->name.data, t->row_count);
|
||||
}
|
||||
|
||||
try_void(Table_setDirtyBit(t, true));
|
||||
Defer(IGNORE_RESULT Table_setDirtyBit(t, false));
|
||||
|
||||
u32 row_size = t->header.row_size;
|
||||
u32 row_size_in_file = t->header.encrypted ? t->enc_buf.size : row_size;
|
||||
i64 file_pos = sizeof(t->header) + id * row_size_in_file;
|
||||
|
||||
// TODO: set dirty bit in backup file too
|
||||
// TODO: save old values to the backup file
|
||||
|
||||
// seek for the row position in file
|
||||
try_void(file_seek(t->table_file, file_pos, SeekOrigin_Start));
|
||||
|
||||
// replace rows in file
|
||||
for(u64 i = 0; i < count; i++){
|
||||
void* row_ptr = (u8*)src + row_size * i;
|
||||
if(t->header.encrypted){
|
||||
try_void(
|
||||
AESBlockEncryptor_encrypt(
|
||||
&t->enc,
|
||||
Array_construct_size(row_ptr, row_size),
|
||||
t->enc_buf
|
||||
)
|
||||
);
|
||||
row_ptr = t->enc_buf.data;
|
||||
}
|
||||
try_void(file_writeStructs(t->table_file, row_ptr, row_size_in_file, 1));
|
||||
}
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(u64) idb_pushRows(Table* t, const void* src, u64 count){
|
||||
Deferral(8);
|
||||
// table lock
|
||||
try_stderrcode(pthread_mutex_lock(&t->mutex));
|
||||
Defer(pthread_mutex_unlock(&t->mutex));
|
||||
|
||||
try_void(Table_setDirtyBit(t, true));
|
||||
Defer(IGNORE_RESULT Table_setDirtyBit(t, false));
|
||||
|
||||
u32 row_size = t->header.row_size;
|
||||
u32 row_size_in_file = t->header.encrypted ? t->enc_buf.size : row_size;
|
||||
const u64 new_row_index = t->row_count;
|
||||
|
||||
// seek for end of the file
|
||||
try_void(file_seek(t->table_file, 0, SeekOrigin_End));
|
||||
|
||||
// write new rows to the file
|
||||
for(u64 i = 0; i < count; i++){
|
||||
void* row_ptr = (u8*)src + row_size * i;
|
||||
if(t->header.encrypted){
|
||||
try_void(
|
||||
AESBlockEncryptor_encrypt(
|
||||
&t->enc,
|
||||
Array_construct_size(row_ptr, row_size),
|
||||
t->enc_buf
|
||||
)
|
||||
);
|
||||
row_ptr = t->enc_buf.data;
|
||||
}
|
||||
try_void(file_writeStructs(t->table_file, row_ptr, row_size_in_file, 1));
|
||||
t->row_count++;
|
||||
}
|
||||
|
||||
Return RESULT_VALUE(u, new_row_index);
|
||||
}
|
||||
|
||||
Result(u64) idb_getRowCount(Table* t){
|
||||
Deferral(4);
|
||||
// table lock
|
||||
try_stderrcode(pthread_mutex_lock(&t->mutex));
|
||||
Defer(pthread_mutex_unlock(&t->mutex));
|
||||
u64 count = t->row_count;
|
||||
Return RESULT_VALUE(u, count);
|
||||
}
|
||||
26
src/db/idb.h
26
src/db/idb.h
@@ -1,26 +0,0 @@
|
||||
#pragma once
|
||||
|
||||
#include "tlibc/errors.h"
|
||||
|
||||
#define IDB_VERSION 1
|
||||
#define IDB_AES_KEY_SIZE 32
|
||||
|
||||
typedef struct IncrementalDB IncrementalDB;
|
||||
typedef struct Table Table;
|
||||
|
||||
|
||||
Result(IncrementalDB*) idb_open(str db_dir, NULLABLE(Array(u8) aes_key));
|
||||
void idb_close(IncrementalDB* db);
|
||||
|
||||
Result(Table*) idb_getOrCreateTable(IncrementalDB* db, str table_name, u32 row_size);
|
||||
|
||||
Result(void) idb_getRows(Table* t, u64 start_from_id, void* dst, u64 count);
|
||||
#define idb_getRow(T, ID, DST) idb_getRows(T, ID, DST, 1)
|
||||
|
||||
Result(u64) idb_pushRows(Table* t, const void* src, u64 count);
|
||||
#define idb_pushRow(T, SRC) idb_pushRows(T, SRC, 1)
|
||||
|
||||
Result(void) idb_updateRows(Table* t, u64 start_from_id, const void* src, u64 count);
|
||||
#define idb_updateRow(T, ID, SRC) idb_updateRows(T, ID, SRC, 1)
|
||||
|
||||
Result(u64) idb_getRowCount(Table* t);
|
||||
@@ -1,8 +0,0 @@
|
||||
#pragma once
|
||||
#include <stdio.h>
|
||||
|
||||
#define log(context, severity, format, ...) printf("[%s/" severity "]: " format "\n", context ,##__VA_ARGS__)
|
||||
#define logDebug(context, format, ...) log(context, "DEBUG", format ,##__VA_ARGS__)
|
||||
#define logInfo(context, format, ...) log(context, "INFO", format ,##__VA_ARGS__)
|
||||
#define logWarn(context, format, ...) log(context, "WARN", format ,##__VA_ARGS__)
|
||||
#define logError(context, format, ...) log(context, "ERROR", format ,##__VA_ARGS__)
|
||||
12
src/magic.h
12
src/magic.h
@@ -1,12 +0,0 @@
|
||||
#pragma once
|
||||
#include "tlibc/std.h"
|
||||
|
||||
typedef union Magic32 {
|
||||
u32 n;
|
||||
u8 bytes[4];
|
||||
} Magic32;
|
||||
|
||||
typedef union Magic64 {
|
||||
u64 n;
|
||||
u8 bytes[8];
|
||||
} Magic64;
|
||||
261
src/main.c
261
src/main.c
@@ -1,261 +0,0 @@
|
||||
#include "network/network.h"
|
||||
#include "client/client.h"
|
||||
#include "server/server.h"
|
||||
#include "tlibc/tlibc.h"
|
||||
#include "tlibc/base64.h"
|
||||
|
||||
#define _DEFAULT_CONFIG_PATH_CLIENT "tcp-chat-client.config"
|
||||
#define _DEFAULT_CONFIG_PATH_SERVER "tcp-chat-server.config"
|
||||
|
||||
typedef enum ProgramMode {
|
||||
ClientMode,
|
||||
ServerMode,
|
||||
RsaGenStdin,
|
||||
RsaGenRandom,
|
||||
RandomBytes,
|
||||
RandomBytesBase64,
|
||||
} ProgramMode;
|
||||
|
||||
#define arg_is(LITERAL) str_equals(arg_str, STR(LITERAL))
|
||||
|
||||
int main(const int argc, cstr const* argv){
|
||||
Deferral(32);
|
||||
|
||||
try_fatal_void(tlibc_init());
|
||||
Defer(tlibc_deinit());
|
||||
try_fatal_void(network_init());
|
||||
Defer(network_deinit());
|
||||
|
||||
if(br_prng_seeder_system(NULL) == NULL){
|
||||
printfe("Can't get system random seeder. Bearssl is compiled incorrectly.");
|
||||
return 1;
|
||||
}
|
||||
|
||||
ProgramMode mode = ClientMode;
|
||||
cstr config_path = NULL;
|
||||
u32 size_arg = 0;
|
||||
|
||||
for(int argi = 1; argi < argc; argi++){
|
||||
str arg_str = str_from_cstr(argv[argi]);
|
||||
if(arg_is("-h") || arg_is("--help")){
|
||||
printf(
|
||||
"USAGE:\n"
|
||||
"no arguments Interactive client mode.\n"
|
||||
"-h, --help Show this message.\n"
|
||||
"-l, --listen Start server.\n"
|
||||
"--config [path] Load config from specified path.\n"
|
||||
" Default path for config is '" _DEFAULT_CONFIG_PATH_CLIENT "' or '" _DEFAULT_CONFIG_PATH_SERVER "'\n"
|
||||
"--rsa-gen-stdin [size] Generate RSA private and public keys based on stdin data (64Kb max).\n"
|
||||
" size: 2048 / 3072 (default) / 4096\n"
|
||||
" Usage: `cat somefile | tcp-chat --gen-rsa-stdin`\n"
|
||||
"--rsa-gen-random [size] Generate random RSA private and public keys.\n"
|
||||
" size: 2048 / 3072 (default) / 4096\n"
|
||||
"--random-bytes [size] Generate random bytes.\n"
|
||||
" size: any number (default=32)\n"
|
||||
"--random-bytes-base64 [size] Generate random bytes and print them in base64 encoding.\n"
|
||||
" size: any number (default=32)\n"
|
||||
);
|
||||
Return 0;
|
||||
}
|
||||
if(arg_is("-l") || arg_is("--listen")){
|
||||
if(mode != ClientMode){
|
||||
printf("program mode is set already\n");
|
||||
Return 1;
|
||||
}
|
||||
mode = ServerMode;
|
||||
}
|
||||
else if(arg_is("--config")){
|
||||
if(++argi >= argc){
|
||||
printfe("ERROR: no config path specified\n");
|
||||
Return 1;
|
||||
}
|
||||
config_path = argv[argi];
|
||||
}
|
||||
else if(arg_is("--rsa-gen-stdin")){
|
||||
if(mode != ClientMode){
|
||||
printf("program mode is set already\n");
|
||||
Return 1;
|
||||
}
|
||||
|
||||
mode = RsaGenStdin;
|
||||
if(++argi >= argc){
|
||||
size_arg = RSA_DEFAULT_KEY_SIZE;
|
||||
}
|
||||
else if(sscanf(argv[argi], "%u", &size_arg) != 1){
|
||||
printfe("ERROR: no key size specified\n");
|
||||
}
|
||||
}
|
||||
|
||||
else if(arg_is("--rsa-gen-random")){
|
||||
if(mode != ClientMode){
|
||||
printf("program mode is set already\n");
|
||||
Return 1;
|
||||
}
|
||||
|
||||
mode = RsaGenRandom;
|
||||
if(++argi >= argc){
|
||||
size_arg = RSA_DEFAULT_KEY_SIZE;
|
||||
}
|
||||
else if(sscanf(argv[argi], "%u", &size_arg) != 1){
|
||||
printfe("ERROR: no key size specified\n");
|
||||
}
|
||||
}
|
||||
else if(arg_is("--random-bytes")){
|
||||
if(mode != ClientMode){
|
||||
printf("program mode is set already\n");
|
||||
Return 1;
|
||||
}
|
||||
|
||||
mode = RandomBytes;
|
||||
if(++argi >= argc){
|
||||
size_arg = 32;
|
||||
}
|
||||
else if(sscanf(argv[argi], "%u", &size_arg) != 1){
|
||||
printfe("ERROR: no size specified\n");
|
||||
}
|
||||
}
|
||||
else if(arg_is("--random-bytes-base64")){
|
||||
if(mode != ClientMode){
|
||||
printf("program mode is set already\n");
|
||||
Return 1;
|
||||
}
|
||||
|
||||
mode = RandomBytesBase64;
|
||||
if(++argi >= argc){
|
||||
size_arg = 32;
|
||||
}
|
||||
else if(sscanf(argv[argi], "%u", &size_arg) != 1){
|
||||
printfe("ERROR: no size specified\n");
|
||||
}
|
||||
}
|
||||
else {
|
||||
printfe("ERROR: unknown argument '%s'\n"
|
||||
"Use '-h' to see list of avaliable arguments\n",
|
||||
argv[argi]);
|
||||
Return 1;
|
||||
}
|
||||
}
|
||||
|
||||
switch(mode){
|
||||
case ClientMode: {
|
||||
if(!config_path)
|
||||
config_path = _DEFAULT_CONFIG_PATH_CLIENT;
|
||||
|
||||
try_fatal(Client* client, p, Client_createFromConfig(config_path));
|
||||
Defer(Client_free(client));
|
||||
try_fatal_void(Client_run(client));
|
||||
break;
|
||||
}
|
||||
|
||||
case ServerMode: {
|
||||
if(!config_path)
|
||||
config_path = _DEFAULT_CONFIG_PATH_SERVER;
|
||||
|
||||
try_fatal(Server* server, p, Server_createFromConfig(config_path));
|
||||
Defer(Server_free(server));
|
||||
try_fatal_void(Server_run(server));
|
||||
break;
|
||||
}
|
||||
|
||||
case RsaGenStdin: {
|
||||
printfe("reading stdin...\n");
|
||||
Array(u8) input_buf = Array_alloc_size(64*1024);
|
||||
Defer(free(input_buf.data));
|
||||
br_hmac_drbg_context rng = { .vtable = &br_hmac_drbg_vtable };
|
||||
br_hmac_drbg_init(&rng, &br_sha256_vtable, NULL, 0);
|
||||
i64 read_n = 0;
|
||||
do {
|
||||
read_n = fread(input_buf.data, 1, input_buf.size, stdin);
|
||||
if(read_n < 0){
|
||||
printfe("ERROR: no input\n");
|
||||
Return 1;
|
||||
}
|
||||
// put bytes to rng as seed
|
||||
br_hmac_drbg_update(&rng, input_buf.data, read_n);
|
||||
} while(read_n == input_buf.size);
|
||||
printfe("generating RSA key pair based on stdin...\n");
|
||||
br_rsa_private_key sk;
|
||||
br_rsa_public_key pk;
|
||||
try_fatal_void(RSA_generateKeyPair(size_arg, &sk, &pk, &rng.vtable));
|
||||
Defer(
|
||||
RSA_destroyPrivateKey(&sk);
|
||||
RSA_destroyPublicKey(&pk);
|
||||
);
|
||||
|
||||
str sk_str = RSA_serializePrivateKey_base64(&sk);
|
||||
printf("rsa_private_key = %s\n", sk_str.data);
|
||||
free(sk_str.data);
|
||||
|
||||
str pk_str = RSA_serializePublicKey_base64(&pk);
|
||||
printf("\nrsa_public_key = %s\n", pk_str.data);
|
||||
free(pk_str.data);
|
||||
break;
|
||||
}
|
||||
|
||||
case RsaGenRandom: {
|
||||
printfe("generating random RSA key pair...\n");
|
||||
br_rsa_private_key sk;
|
||||
br_rsa_public_key pk;
|
||||
try_fatal_void(RSA_generateKeyPairFromSystemRandom(size_arg, &sk, &pk));
|
||||
Defer(
|
||||
RSA_destroyPrivateKey(&sk);
|
||||
RSA_destroyPublicKey(&pk);
|
||||
);
|
||||
|
||||
str sk_str = RSA_serializePrivateKey_base64(&sk);
|
||||
printf("rsa_private_key = %s\n", sk_str.data);
|
||||
free(sk_str.data);
|
||||
|
||||
str pk_str = RSA_serializePublicKey_base64(&pk);
|
||||
printf("\nrsa_public_key = %s\n", pk_str.data);
|
||||
free(pk_str.data);
|
||||
break;
|
||||
}
|
||||
|
||||
case RandomBytes: {
|
||||
printfe("generating random bytes...\n");
|
||||
br_hmac_drbg_context rng = { .vtable = &br_hmac_drbg_vtable };
|
||||
rng_init_sha256_seedFromSystem(&rng.vtable);
|
||||
Array(u8) random_buf = Array_alloc_size(1024);
|
||||
u32 full_buffers_n = size_arg / random_buf.size;
|
||||
u32 remaining_n = size_arg % random_buf.size;
|
||||
while(full_buffers_n > 0){
|
||||
full_buffers_n--;
|
||||
br_hmac_drbg_generate(&rng, random_buf.data, random_buf.size);
|
||||
fwrite(random_buf.data, 1, random_buf.size, stdout);
|
||||
}
|
||||
|
||||
br_hmac_drbg_generate(&rng, random_buf.data, remaining_n);
|
||||
fwrite(random_buf.data, 1, remaining_n, stdout);
|
||||
break;
|
||||
}
|
||||
|
||||
case RandomBytesBase64: {
|
||||
printfe("generating random bytes...\n");
|
||||
br_hmac_drbg_context rng = { .vtable = &br_hmac_drbg_vtable };
|
||||
rng_init_sha256_seedFromSystem(&rng.vtable);
|
||||
Array(u8) random_buf = Array_alloc_size(1024);
|
||||
Array(u8) base64_buf = Array_alloc_size(base64_encodedSize(random_buf.size));
|
||||
u32 full_buffers_n = size_arg / random_buf.size;
|
||||
u32 remaining_n = size_arg % random_buf.size;
|
||||
u32 enc_size = 0;
|
||||
while(full_buffers_n > 0){
|
||||
full_buffers_n--;
|
||||
br_hmac_drbg_generate(&rng, random_buf.data, random_buf.size);
|
||||
enc_size = base64_encode(random_buf.data, random_buf.size, base64_buf.data);
|
||||
fwrite(base64_buf.data, 1, enc_size, stdout);
|
||||
}
|
||||
|
||||
br_hmac_drbg_generate(&rng, random_buf.data, remaining_n);
|
||||
enc_size = base64_encode(random_buf.data, remaining_n, base64_buf.data);
|
||||
fwrite(base64_buf.data, 1, enc_size, stdout);
|
||||
break;
|
||||
}
|
||||
|
||||
default:
|
||||
printfe("ERROR: invalid program mode %i\n", mode);
|
||||
Return 1;
|
||||
}
|
||||
|
||||
Return 0;
|
||||
}
|
||||
@@ -10,16 +10,16 @@ void EncryptedSocketTCP_construct(EncryptedSocketTCP* ptr,
|
||||
ptr->sock = sock;
|
||||
AESStreamEncryptor_construct(&ptr->enc, aes_key, AESStream_DEFAULT_CLASS);
|
||||
AESStreamDecryptor_construct(&ptr->dec, aes_key, AESStream_DEFAULT_CLASS);
|
||||
ptr->recv_buf = Array_alloc_size(crypto_buffer_size);
|
||||
ptr->send_buf = Array_alloc_size(crypto_buffer_size);
|
||||
ptr->recv_buf = Array_u8_alloc(crypto_buffer_size);
|
||||
ptr->send_buf = Array_u8_alloc(crypto_buffer_size);
|
||||
}
|
||||
|
||||
void EncryptedSocketTCP_destroy(EncryptedSocketTCP* ptr){
|
||||
if(!ptr)
|
||||
return;
|
||||
socket_close(ptr->sock);
|
||||
free(ptr->recv_buf.data);
|
||||
free(ptr->send_buf.data);
|
||||
Array_u8_destroy(&ptr->recv_buf);
|
||||
Array_u8_destroy(&ptr->send_buf);
|
||||
}
|
||||
|
||||
void EncryptedSocketTCP_changeKey(EncryptedSocketTCP* ptr, Array(u8) aes_key){
|
||||
@@ -42,10 +42,11 @@ Result(void) EncryptedSocketTCP_send(EncryptedSocketTCP* ptr,
|
||||
try_void(
|
||||
socket_send(
|
||||
ptr->sock,
|
||||
Array_sliceTo(ptr->send_buf, encrypted_size)
|
||||
Array_u8_sliceTo(ptr->send_buf, encrypted_size)
|
||||
)
|
||||
);
|
||||
|
||||
// printf("SEND data_size: %u, enc_size: %u\n", buffer.len, encrypted_size);
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
@@ -54,7 +55,7 @@ Result(u32) EncryptedSocketTCP_recv(EncryptedSocketTCP* ptr,
|
||||
{
|
||||
Deferral(1);
|
||||
|
||||
u32 size_to_receive = buffer.size;
|
||||
u32 size_to_receive = buffer.len;
|
||||
if(ptr->dec.block_counter == 0){
|
||||
// There is some metadata at the beginning of AES stream
|
||||
size_to_receive = AESStreamEncryptor_calcDstSize(size_to_receive);
|
||||
@@ -62,18 +63,19 @@ Result(u32) EncryptedSocketTCP_recv(EncryptedSocketTCP* ptr,
|
||||
try(i32 received_size, i,
|
||||
socket_recv(
|
||||
ptr->sock,
|
||||
Array_sliceTo(ptr->recv_buf, size_to_receive),
|
||||
Array_u8_sliceTo(ptr->recv_buf, size_to_receive),
|
||||
flags
|
||||
)
|
||||
);
|
||||
try(u32 decrypted_size, u,
|
||||
AESStreamDecryptor_decrypt(
|
||||
&ptr->dec,
|
||||
Array_sliceTo(ptr->recv_buf, received_size),
|
||||
Array_u8_sliceTo(ptr->recv_buf, received_size),
|
||||
buffer
|
||||
)
|
||||
);
|
||||
|
||||
// printf("RECV recv_size: %u, dec_size: %u\n", received_size, decrypted_size);
|
||||
Return RESULT_VALUE(u, decrypted_size);
|
||||
}
|
||||
|
||||
@@ -92,10 +94,11 @@ Result(void) EncryptedSocketTCP_sendRSA(EncryptedSocketTCP* ptr,
|
||||
try_void(
|
||||
socket_send(
|
||||
ptr->sock,
|
||||
Array_sliceTo(ptr->send_buf, encrypted_size)
|
||||
Array_u8_sliceTo(ptr->send_buf, encrypted_size)
|
||||
)
|
||||
);
|
||||
|
||||
// printf("SEND-RSA data_size: %u, enc_size: %u\n", buffer.len, encrypted_size);
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
@@ -116,34 +119,36 @@ Result(u32) EncryptedSocketTCP_recvRSA(EncryptedSocketTCP* ptr,
|
||||
try(i32 received_size, i,
|
||||
socket_recv(
|
||||
ptr->sock,
|
||||
Array_sliceTo(ptr->recv_buf, size_to_receive),
|
||||
Array_u8_sliceTo(ptr->recv_buf, size_to_receive),
|
||||
flags
|
||||
)
|
||||
);
|
||||
try(u32 decrypted_size, u,
|
||||
RSADecryptor_decrypt(
|
||||
rsa_dec,
|
||||
Array_sliceTo(ptr->recv_buf, received_size)
|
||||
Array_u8_sliceTo(ptr->recv_buf, received_size)
|
||||
)
|
||||
);
|
||||
|
||||
if(fill_whole_buffer){
|
||||
if(decrypted_size != buffer.size){
|
||||
if(decrypted_size != buffer.len){
|
||||
Return RESULT_ERROR_FMT(
|
||||
"SocketRecvFlag_WholeBuffer is set, "
|
||||
"but decrypted_size (%u) != buffer.size (%u)",
|
||||
decrypted_size, buffer.size
|
||||
"but decrypted_size (%u) != buffer.len (%u)",
|
||||
decrypted_size, buffer.len
|
||||
);
|
||||
}
|
||||
}
|
||||
else if(decrypted_size > buffer.size){
|
||||
else if(decrypted_size > buffer.len){
|
||||
Return RESULT_ERROR_FMT(
|
||||
"decrypted_size (%u) > buffer.size (%u)",
|
||||
decrypted_size, buffer.size
|
||||
"decrypted_size (%u) > buffer.len (%u)",
|
||||
decrypted_size, buffer.len
|
||||
);
|
||||
}
|
||||
|
||||
memcpy(buffer.data, ptr->recv_buf.data, decrypted_size);
|
||||
|
||||
// printf("RECV-RSA recv_size: %u, dec_size: %u\n", received_size, decrypted_size);
|
||||
Return RESULT_VALUE(u, decrypted_size);
|
||||
}
|
||||
|
||||
@@ -158,17 +163,16 @@ void EncryptedSocketUDP_construct(EncryptedSocketUDP* ptr,
|
||||
ptr->sock = sock;
|
||||
AESBlockEncryptor_construct(&ptr->enc, aes_key, AESBlockEncryptor_DEFAULT_CLASS);
|
||||
AESBlockDecryptor_construct(&ptr->dec, aes_key, AESBlockDecryptor_DEFAULT_CLASS);
|
||||
ptr->recv_buf = Array_alloc_size(crypto_buffer_size);
|
||||
ptr->send_buf = Array_alloc_size(crypto_buffer_size);
|
||||
ptr->recv_buf = Array_u8_alloc(crypto_buffer_size);
|
||||
ptr->send_buf = Array_u8_alloc(crypto_buffer_size);
|
||||
}
|
||||
|
||||
void EncryptedSocketUDP_destroy(EncryptedSocketUDP* ptr){
|
||||
if(!ptr)
|
||||
return;
|
||||
|
||||
socket_close(ptr->sock);
|
||||
free(ptr->recv_buf.data);
|
||||
free(ptr->send_buf.data);
|
||||
Array_u8_destroy(&ptr->recv_buf);
|
||||
Array_u8_destroy(&ptr->send_buf);
|
||||
}
|
||||
|
||||
void EncryptedSocketUDP_changeKey(EncryptedSocketUDP* ptr, Array(u8) aes_key){
|
||||
@@ -191,7 +195,7 @@ Result(void) EncryptedSocketUDP_sendto(EncryptedSocketUDP* ptr,
|
||||
try_void(
|
||||
socket_sendto(
|
||||
ptr->sock,
|
||||
Array_sliceTo(ptr->send_buf, encrypted_size),
|
||||
Array_u8_sliceTo(ptr->send_buf, encrypted_size),
|
||||
remote_end
|
||||
)
|
||||
);
|
||||
@@ -205,11 +209,11 @@ Result(i32) EncryptedSocketUDP_recvfrom(EncryptedSocketUDP* ptr,
|
||||
Deferral(1);
|
||||
|
||||
// There is some metadata at the start of each AES block
|
||||
u32 size_to_receive = AESBlockEncryptor_calcDstSize(buffer.size);
|
||||
u32 size_to_receive = AESBlockEncryptor_calcDstSize(buffer.len);
|
||||
try(i32 received_size, i,
|
||||
socket_recvfrom(
|
||||
ptr->sock,
|
||||
Array_sliceTo(ptr->recv_buf, size_to_receive),
|
||||
Array_u8_sliceTo(ptr->recv_buf, size_to_receive),
|
||||
flags,
|
||||
remote_end
|
||||
)
|
||||
@@ -217,7 +221,7 @@ Result(i32) EncryptedSocketUDP_recvfrom(EncryptedSocketUDP* ptr,
|
||||
try(u32 decrypted_size, u,
|
||||
AESBlockDecryptor_decrypt(
|
||||
&ptr->dec,
|
||||
Array_sliceTo(ptr->recv_buf, received_size),
|
||||
Array_u8_sliceTo(ptr->recv_buf, received_size),
|
||||
buffer
|
||||
)
|
||||
);
|
||||
|
||||
@@ -28,14 +28,14 @@ Result(void) EncryptedSocketTCP_send(EncryptedSocketTCP* ptr,
|
||||
|
||||
#define EncryptedSocketTCP_sendStruct(socket, structPtr)\
|
||||
EncryptedSocketTCP_send(socket,\
|
||||
Array_construct_size(structPtr, sizeof(*structPtr)))
|
||||
struct_castTo_Array_u8(structPtr))
|
||||
|
||||
Result(u32) EncryptedSocketTCP_recv(EncryptedSocketTCP* ptr,
|
||||
Array(u8) buffer, SocketRecvFlag flags);
|
||||
|
||||
#define EncryptedSocketTCP_recvStruct(socket, structPtr)\
|
||||
EncryptedSocketTCP_recv(socket,\
|
||||
Array_construct_size(structPtr, sizeof(*structPtr)),\
|
||||
struct_castTo_Array_u8(structPtr),\
|
||||
SocketRecvFlag_WholeBuffer)
|
||||
|
||||
Result(void) EncryptedSocketTCP_sendRSA(EncryptedSocketTCP* ptr,
|
||||
@@ -43,14 +43,14 @@ Result(void) EncryptedSocketTCP_sendRSA(EncryptedSocketTCP* ptr,
|
||||
|
||||
#define EncryptedSocketTCP_sendStructRSA(socket, rsa_enc, structPtr)\
|
||||
EncryptedSocketTCP_sendRSA(socket, rsa_enc,\
|
||||
Array_construct_size(structPtr, sizeof(*structPtr)))
|
||||
struct_castTo_Array_u8(structPtr))
|
||||
|
||||
Result(u32) EncryptedSocketTCP_recvRSA(EncryptedSocketTCP* ptr,
|
||||
RSADecryptor* rsa_dec, Array(u8) buffer, SocketRecvFlag flags);
|
||||
|
||||
#define EncryptedSocketTCP_recvStructRSA(socket, rsa_dec, structPtr)\
|
||||
EncryptedSocketTCP_recvRSA(socket, rsa_dec,\
|
||||
Array_construct_size(structPtr, sizeof(*structPtr)),\
|
||||
struct_castTo_Array_u8(structPtr),\
|
||||
SocketRecvFlag_WholeBuffer)
|
||||
|
||||
//////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
@@ -1,7 +1,6 @@
|
||||
#pragma once
|
||||
#include "tlibc/errors.h"
|
||||
#include "tcp-chat.h"
|
||||
#include "endpoint.h"
|
||||
#include "network.h"
|
||||
|
||||
#if !defined(KN_USE_WINSOCK)
|
||||
#if defined(_WIN64) || defined(_WIN32)
|
||||
|
||||
@@ -1,7 +0,0 @@
|
||||
#pragma once
|
||||
#include "tlibc/errors.h"
|
||||
|
||||
ErrorCodePage_declare(WINSOCK2);
|
||||
|
||||
Result(void) network_init();
|
||||
void network_deinit();
|
||||
@@ -60,11 +60,11 @@ Result(void) socket_connect(Socket s, EndpointIPv4 remote_end){
|
||||
}
|
||||
|
||||
Result(void) socket_send(Socket s, Array(u8) buffer){
|
||||
i32 r = send(s, buffer.data, buffer.size, 0);
|
||||
i32 r = send(s, (void*)buffer.data, buffer.len, 0);
|
||||
if(r < 0){
|
||||
return RESULT_ERROR_SOCKET();
|
||||
}
|
||||
if((u32)r != buffer.size){
|
||||
if((u32)r != buffer.len){
|
||||
return RESULT_ERROR_FMT("Socket was unable to send data");
|
||||
}
|
||||
return RESULT_VOID;
|
||||
@@ -72,11 +72,11 @@ Result(void) socket_send(Socket s, Array(u8) buffer){
|
||||
|
||||
Result(void) socket_sendto(Socket s, Array(u8) buffer, EndpointIPv4 dst){
|
||||
struct sockaddr_in sockaddr = EndpointIPv4_toSockaddr(dst);
|
||||
i32 r = sendto(s, buffer.data, buffer.size, 0, (void*)&sockaddr, sizeof(sockaddr));
|
||||
i32 r = sendto(s, (void*)buffer.data, buffer.len, 0, (void*)&sockaddr, sizeof(sockaddr));
|
||||
if(r < 0){
|
||||
return RESULT_ERROR_SOCKET();
|
||||
}
|
||||
if((u32)r != buffer.size){
|
||||
if((u32)r != buffer.len){
|
||||
return RESULT_ERROR_FMT("Socket was unable to send data");
|
||||
}
|
||||
return RESULT_VOID;
|
||||
@@ -92,13 +92,13 @@ static inline int SocketRecvFlags_toStd(SocketRecvFlag flags){
|
||||
}
|
||||
|
||||
Result(i32) socket_recv(Socket s, Array(u8) buffer, SocketRecvFlag flags){
|
||||
i32 r = recv(s, buffer.data, buffer.size, SocketRecvFlags_toStd(flags));
|
||||
i32 r = recv(s, (void*)buffer.data, buffer.len, SocketRecvFlags_toStd(flags));
|
||||
if(r < 0){
|
||||
return RESULT_ERROR_SOCKET();
|
||||
}
|
||||
if(r == 0 || (flags & SocketRecvFlag_WholeBuffer && (u32)r != buffer.size))
|
||||
if(r == 0 || (flags & SocketRecvFlag_WholeBuffer && (u32)r != buffer.len))
|
||||
{
|
||||
return RESULT_ERROR("Socket closed", false);
|
||||
return RESULT_ERROR_LITERAL("Socket closed");
|
||||
}
|
||||
return RESULT_VALUE(i, r);
|
||||
}
|
||||
@@ -106,14 +106,14 @@ Result(i32) socket_recv(Socket s, Array(u8) buffer, SocketRecvFlag flags){
|
||||
Result(i32) socket_recvfrom(Socket s, Array(u8) buffer, SocketRecvFlag flags, NULLABLE(EndpointIPv4*) remote_end){
|
||||
struct sockaddr_in remote_addr = {0};
|
||||
i32 sockaddr_size = sizeof(remote_addr);
|
||||
i32 r = recvfrom(s, buffer.data, buffer.size, SocketRecvFlags_toStd(flags),
|
||||
i32 r = recvfrom(s, (void*)buffer.data, buffer.len, SocketRecvFlags_toStd(flags),
|
||||
(struct sockaddr*)&remote_addr, (void*)&sockaddr_size);
|
||||
if(r < 0){
|
||||
return RESULT_ERROR_SOCKET();
|
||||
}
|
||||
if(r == 0 || (flags & SocketRecvFlag_WholeBuffer && (u32)r != buffer.size))
|
||||
if(r == 0 || (flags & SocketRecvFlag_WholeBuffer && (u32)r != buffer.len))
|
||||
{
|
||||
return RESULT_ERROR("Socket closed", false);
|
||||
return RESULT_ERROR_LITERAL("Socket closed");
|
||||
}
|
||||
|
||||
//TODO: add IPV6 support (struct sockaddr_in6)
|
||||
@@ -132,12 +132,12 @@ Result(i32) socket_recvfrom(Socket s, Array(u8) buffer, SocketRecvFlag flags, NU
|
||||
}
|
||||
|
||||
Result(void) socket_TCP_enableAliveChecks(Socket s,
|
||||
sec_t first_check_time, u32 checks_count, sec_t checks_interval)
|
||||
sec_t first_check_time, u32 check_count, sec_t checks_interval)
|
||||
{
|
||||
#if KN_USE_WINSOCK
|
||||
BOOL opt_SO_KEEPALIVE = 1; // enable keepalives
|
||||
DWORD opt_TCP_KEEPIDLE = first_check_time;
|
||||
DWORD opt_TCP_KEEPCNT = checks_count;
|
||||
DWORD opt_TCP_KEEPCNT = check_count;
|
||||
DWORD opt_TCP_KEEPINTVL = checks_interval;
|
||||
try_setsockopt(s, SOL_SOCKET, SO_KEEPALIVE);
|
||||
try_setsockopt(s, IPPROTO_TCP, TCP_KEEPIDLE);
|
||||
@@ -145,12 +145,12 @@ Result(void) socket_TCP_enableAliveChecks(Socket s,
|
||||
try_setsockopt(s, IPPROTO_TCP, TCP_KEEPINTVL);
|
||||
|
||||
// timeout for connect()
|
||||
DWORD opt_TCP_MAXRT = checks_count * checks_interval;
|
||||
DWORD opt_TCP_MAXRT = check_count * checks_interval;
|
||||
try_setsockopt(s, IPPROTO_TCP, TCP_MAXRT);
|
||||
#else
|
||||
int opt_SO_KEEPALIVE = 1; // enable keepalives
|
||||
int opt_TCP_KEEPIDLE = first_check_time;
|
||||
int opt_TCP_KEEPCNT = checks_count;
|
||||
int opt_TCP_KEEPCNT = check_count;
|
||||
int opt_TCP_KEEPINTVL = checks_interval;
|
||||
try_setsockopt(s, SOL_SOCKET, SO_KEEPALIVE);
|
||||
try_setsockopt(s, IPPROTO_TCP, TCP_KEEPIDLE);
|
||||
@@ -158,7 +158,7 @@ Result(void) socket_TCP_enableAliveChecks(Socket s,
|
||||
try_setsockopt(s, IPPROTO_TCP, TCP_KEEPINTVL);
|
||||
|
||||
// read more in the article
|
||||
int opt_TCP_USER_TIMEOUT = checks_count * checks_interval * 1000;
|
||||
int opt_TCP_USER_TIMEOUT = check_count * checks_interval * 1000;
|
||||
try_setsockopt(s, IPPROTO_TCP, TCP_USER_TIMEOUT);
|
||||
#endif
|
||||
return RESULT_VOID;
|
||||
|
||||
@@ -38,7 +38,7 @@ Result(i32) socket_recvfrom(Socket s, Array(u8) buffer, SocketRecvFlag flags
|
||||
/// Read more: https://blog.cloudflare.com/when-tcp-sockets-refuse-to-die/
|
||||
/// RU translaton: https://habr.com/ru/articles/700470/
|
||||
Result(void) socket_TCP_enableAliveChecks(Socket s,
|
||||
sec_t first_check_time, u32 checks_count, sec_t checks_interval);
|
||||
sec_t first_check_time, u32 check_count, sec_t checks_interval);
|
||||
#define socket_TCP_enableAliveChecks_default(socket) \
|
||||
socket_TCP_enableAliveChecks(socket, 1, 4, 5)
|
||||
|
||||
|
||||
@@ -4,7 +4,7 @@ const Magic64 PacketHeader_MAGIC = { .bytes = { 't', 'c', 'p', '-', 'c', 'h', 'a
|
||||
|
||||
Result(void) PacketHeader_validateMagic(PacketHeader* ptr){
|
||||
if (ptr->magic.n != PacketHeader_MAGIC.n){
|
||||
return RESULT_ERROR("invalid packet magic", false);
|
||||
return RESULT_ERROR_LITERAL("invalid packet magic");
|
||||
}
|
||||
return RESULT_VOID;
|
||||
}
|
||||
@@ -29,7 +29,7 @@ Result(void) PacketHeader_validateContentSize(PacketHeader* ptr, u64 expected_si
|
||||
}
|
||||
|
||||
void PacketHeader_construct(PacketHeader* ptr, u8 protocol_version, u16 type, u64 content_size){
|
||||
memset(ptr, 0, sizeof(*ptr));
|
||||
zeroStruct(ptr);
|
||||
ptr->magic.n = PacketHeader_MAGIC.n;
|
||||
ptr->protocol_version = protocol_version;
|
||||
ptr->type = type;
|
||||
|
||||
@@ -1,7 +1,6 @@
|
||||
#pragma once
|
||||
#include "tlibc/errors.h"
|
||||
#include "magic.h"
|
||||
#include "common_constants.h"
|
||||
#include "tcp-chat.h"
|
||||
#include "tlibc/magic.h"
|
||||
|
||||
#define AES_SESSION_KEY_SIZE 32
|
||||
|
||||
@@ -14,6 +13,7 @@ typedef struct PacketHeader {
|
||||
u8 _reserved1;
|
||||
u16 type;
|
||||
u32 _reserved4;
|
||||
/* size of request/response struct */
|
||||
u64 content_size;
|
||||
} ATTRIBUTE_ALIGNED(64) PacketHeader;
|
||||
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
str validateUsername_cstr(char username[USERNAME_SIZE_MAX+1], str* out_username_str){
|
||||
// must end with 0
|
||||
if(username[USERNAME_SIZE_MAX] != '\0'){
|
||||
return STR("Username string doesn't end correctly");
|
||||
return str_copy(STR("Username string doesn't end correctly"));
|
||||
}
|
||||
|
||||
str u = str_from_cstr(username);
|
||||
@@ -16,11 +16,16 @@ str validateUsername_cstr(char username[USERNAME_SIZE_MAX+1], str* out_username_
|
||||
}
|
||||
|
||||
str validateUsername_str(str username){
|
||||
if(username.size < USERNAME_SIZE_MIN){
|
||||
return STR("Username length is too small");
|
||||
if(username.len < USERNAME_SIZE_MIN || username.len > USERNAME_SIZE_MAX){
|
||||
return str_from_cstr(
|
||||
sprintf_malloc(
|
||||
"username length (in bytes) must be >= %i and <= %i",
|
||||
USERNAME_SIZE_MIN, USERNAME_SIZE_MAX
|
||||
)
|
||||
);
|
||||
}
|
||||
|
||||
for(u32 i = 0; i < username.size; i++){
|
||||
for(u32 i = 0; i < username.len; i++){
|
||||
char c = username.data[i];
|
||||
if (char_isLatinLower(c) ||
|
||||
char_isLatinUpper(c) ||
|
||||
@@ -28,8 +33,8 @@ str validateUsername_str(str username){
|
||||
c == '.' || c == '_' || c == '-')
|
||||
continue;
|
||||
|
||||
return STR("Username contains restricted characters. "
|
||||
"Allowed characters: latin, digits, ._-");
|
||||
return str_copy(STR("Username contains restricted characters. "
|
||||
"Allowed characters: latin, digits, ._-"));
|
||||
}
|
||||
|
||||
return str_null;
|
||||
@@ -40,7 +45,7 @@ str validateUsername_str(str username){
|
||||
|
||||
void ErrorMessage_construct(ErrorMessage* ptr, PacketHeader* header, u32 msg_size){
|
||||
_PacketHeader_construct(ErrorMessage);
|
||||
memset(ptr, 0, sizeof(*ptr));
|
||||
zeroStruct(ptr);
|
||||
ptr->msg_size = msg_size;
|
||||
}
|
||||
|
||||
@@ -49,19 +54,19 @@ Result(void) ClientHandshake_tryConstruct(ClientHandshake* ptr, PacketHeader* he
|
||||
{
|
||||
Deferral(1);
|
||||
_PacketHeader_construct(ClientHandshake);
|
||||
memset(ptr, 0, sizeof(*ptr));
|
||||
zeroStruct(ptr);
|
||||
|
||||
try_assert(session_key.size == sizeof(ptr->session_key));
|
||||
memcpy(ptr->session_key, session_key.data, session_key.size);
|
||||
try_assert(session_key.len == sizeof(ptr->session_key));
|
||||
memcpy(ptr->session_key, session_key.data, session_key.len);
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
void ServerHandshake_construct(ServerHandshake* ptr, PacketHeader* header,
|
||||
u64 session_id)
|
||||
i64 session_id)
|
||||
{
|
||||
_PacketHeader_construct(ServerHandshake);
|
||||
memset(ptr, 0, sizeof(*ptr));
|
||||
zeroStruct(ptr);
|
||||
ptr->session_id = session_id;
|
||||
}
|
||||
|
||||
@@ -69,7 +74,7 @@ void ServerPublicInfoRequest_construct(ServerPublicInfoRequest *ptr, PacketHeade
|
||||
ServerPublicInfo property)
|
||||
{
|
||||
_PacketHeader_construct(ServerPublicInfoRequest);
|
||||
memset(ptr, 0, sizeof(*ptr));
|
||||
zeroStruct(ptr);
|
||||
ptr->property = property;
|
||||
}
|
||||
|
||||
@@ -77,7 +82,7 @@ void ServerPublicInfoResponse_construct(ServerPublicInfoResponse* ptr, PacketHea
|
||||
u32 data_size)
|
||||
{
|
||||
_PacketHeader_construct(ServerPublicInfoResponse);
|
||||
memset(ptr, 0, sizeof(*ptr));
|
||||
zeroStruct(ptr);
|
||||
ptr->data_size = data_size;
|
||||
}
|
||||
|
||||
@@ -86,26 +91,25 @@ Result(void) LoginRequest_tryConstruct(LoginRequest *ptr, PacketHeader* header,
|
||||
{
|
||||
Deferral(1);
|
||||
_PacketHeader_construct(LoginRequest);
|
||||
memset(ptr, 0, sizeof(*ptr));
|
||||
zeroStruct(ptr);
|
||||
|
||||
str username_check_error = validateUsername_str(username);
|
||||
if(username_check_error.data){
|
||||
Return RESULT_ERROR(username_check_error.data, false);
|
||||
str name_error_str = validateUsername_str(username);
|
||||
if(name_error_str.data){
|
||||
Return RESULT_ERROR(name_error_str, true);
|
||||
}
|
||||
memcpy(ptr->username, username.data, username.size);
|
||||
ptr->username[username.size] = 0;
|
||||
memcpy(ptr->username, username.data, username.len);
|
||||
|
||||
try_assert(token.size == sizeof(ptr->token));
|
||||
memcpy(ptr->token, token.data, token.size);
|
||||
try_assert(token.len == sizeof(ptr->token));
|
||||
memcpy(ptr->token, token.data, token.len);
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
void LoginResponse_construct(LoginResponse* ptr, PacketHeader* header,
|
||||
u64 user_id, u64 landing_channel_id)
|
||||
i64 user_id, i64 landing_channel_id)
|
||||
{
|
||||
_PacketHeader_construct(LoginResponse);
|
||||
memset(ptr, 0, sizeof(*ptr));
|
||||
zeroStruct(ptr);
|
||||
|
||||
ptr->user_id = user_id;
|
||||
ptr->landing_channel_id = landing_channel_id;
|
||||
@@ -116,25 +120,124 @@ Result(void) RegisterRequest_tryConstruct(RegisterRequest *ptr, PacketHeader* he
|
||||
{
|
||||
Deferral(1);
|
||||
_PacketHeader_construct(RegisterRequest);
|
||||
memset(ptr, 0, sizeof(*ptr));
|
||||
zeroStruct(ptr);
|
||||
|
||||
str username_check_error = validateUsername_str(username);
|
||||
if(username_check_error.data){
|
||||
Return RESULT_ERROR(username_check_error.data, false);
|
||||
str name_error_str = validateUsername_str(username);
|
||||
if(name_error_str.data){
|
||||
Return RESULT_ERROR(name_error_str, true);
|
||||
}
|
||||
memcpy(ptr->username, username.data, username.size);
|
||||
ptr->username[username.size] = 0;
|
||||
memcpy(ptr->username, username.data, username.len);
|
||||
|
||||
try_assert(token.size == sizeof(ptr->token));
|
||||
memcpy(ptr->token, token.data, token.size);
|
||||
try_assert(token.len == sizeof(ptr->token));
|
||||
memcpy(ptr->token, token.data, token.len);
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
void RegisterResponse_construct(RegisterResponse *ptr, PacketHeader* header,
|
||||
u64 user_id)
|
||||
i64 user_id)
|
||||
{
|
||||
_PacketHeader_construct(RegisterResponse);
|
||||
memset(ptr, 0, sizeof(*ptr));
|
||||
zeroStruct(ptr);
|
||||
ptr->user_id = user_id;
|
||||
}
|
||||
|
||||
Result(bool) MessageBlock_writeMessage(MessageBlock* block,
|
||||
const MessageMeta* msg_meta, const Array(u8) msg_content)
|
||||
{
|
||||
Deferral(1);
|
||||
|
||||
// check msg_meta
|
||||
try_assert(msg_meta->magic.n == MESSAGE_MAGIC.n);
|
||||
try_assert(msg_meta->data_size >= MESSAGE_SIZE_MIN && msg_meta->data_size <= MESSAGE_SIZE_MAX);
|
||||
try_assert(msg_meta->data_size <= msg_content.len);
|
||||
try_assert(msg_meta->id > 0);
|
||||
try_assert(msg_meta->sender_id > 0);
|
||||
try_assert(msg_meta->timestamp.d.year > 2024);
|
||||
// check block->datum.len
|
||||
if(block->datum.len < block->offset + sizeof(MessageMeta) + msg_meta->data_size){
|
||||
Return RESULT_VALUE(u, false);
|
||||
}
|
||||
|
||||
// write msg_meta
|
||||
memcpy(block->datum.data + block->offset, msg_meta, sizeof(MessageMeta));
|
||||
block->offset += sizeof(MessageMeta);
|
||||
|
||||
// write msg_content
|
||||
memcpy(block->datum.data + block->offset, msg_content.data, msg_meta->data_size);
|
||||
block->offset += msg_meta->data_size;
|
||||
|
||||
block->messages_count++;
|
||||
Return RESULT_VALUE(u, true);
|
||||
}
|
||||
|
||||
Result(bool) MessageBlock_readMessage(MessageBlock* block,
|
||||
MessageMeta* msg_meta, Array(u8) msg_content)
|
||||
{
|
||||
Deferral(1);
|
||||
|
||||
// check block
|
||||
if(block->messages_count == 0){
|
||||
Return RESULT_VALUE(u, false);
|
||||
}
|
||||
try_assert(block->datum.len >= block->offset + sizeof(MessageMeta) + MESSAGE_SIZE_MIN);
|
||||
// check msg_content.len
|
||||
try_assert(msg_content.len >= MESSAGE_SIZE_MAX);
|
||||
|
||||
// read msg_meta
|
||||
memcpy(msg_meta, block->datum.data + block->offset, sizeof(MessageMeta));
|
||||
block->offset += sizeof(MessageMeta);
|
||||
|
||||
// check msg_meta
|
||||
try_assert(msg_meta->magic.n == MESSAGE_MAGIC.n);
|
||||
try_assert(msg_meta->data_size >= MESSAGE_SIZE_MIN && msg_meta->data_size <= MESSAGE_SIZE_MAX);
|
||||
try_assert(msg_meta->data_size <= msg_content.len);
|
||||
try_assert(msg_meta->id > 0);
|
||||
try_assert(msg_meta->sender_id > 0);
|
||||
try_assert(msg_meta->timestamp.d.year > 2024);
|
||||
try_assert(block->datum.len >= block->offset + msg_meta->data_size);
|
||||
|
||||
// read msg_content
|
||||
memcpy(msg_content.data, block->datum.data + block->offset, msg_meta->data_size);
|
||||
block->offset += msg_meta->data_size;
|
||||
|
||||
block->messages_count--;
|
||||
Return RESULT_VALUE(u, true);
|
||||
}
|
||||
|
||||
void SendMessageRequest_construct(SendMessageRequest *ptr, PacketHeader *header,
|
||||
i64 channel_id, u16 data_size)
|
||||
{
|
||||
_PacketHeader_construct(SendMessageRequest);
|
||||
zeroStruct(ptr);
|
||||
ptr->channel_id = channel_id;
|
||||
ptr->data_size = data_size;
|
||||
}
|
||||
|
||||
void SendMessageResponse_construct(SendMessageResponse *ptr, PacketHeader *header,
|
||||
i64 message_id, DateTime timestamp)
|
||||
{
|
||||
_PacketHeader_construct(SendMessageResponse);
|
||||
zeroStruct(ptr);
|
||||
ptr->message_id = message_id;
|
||||
ptr->timestamp = timestamp;
|
||||
}
|
||||
|
||||
void GetMessageBlockRequest_construct(GetMessageBlockRequest *ptr, PacketHeader *header,
|
||||
i64 channel_id, i64 first_message_id, u32 messages_count)
|
||||
{
|
||||
_PacketHeader_construct(GetMessageBlockRequest);
|
||||
zeroStruct(ptr);
|
||||
ptr->channel_id = channel_id;
|
||||
ptr->first_message_id = first_message_id;
|
||||
ptr->messages_count = messages_count;
|
||||
}
|
||||
|
||||
void GetMessageBlockResponse_construct(GetMessageBlockResponse *ptr, PacketHeader *header,
|
||||
u32 messages_count, u32 data_size)
|
||||
{
|
||||
_PacketHeader_construct(GetMessageBlockResponse);
|
||||
zeroStruct(ptr);
|
||||
ptr->messages_count = messages_count;
|
||||
ptr->data_size = data_size;
|
||||
}
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
#pragma once
|
||||
#include "tlibc/errors.h"
|
||||
#include "tlibc/string/str.h"
|
||||
#include "tcp-chat.h"
|
||||
#include "tlibc/time.h"
|
||||
#include "network/tcp-chat-protocol/constant.h"
|
||||
|
||||
#define PROTOCOL_VERSION 1 /* 1.0.0 */
|
||||
@@ -15,7 +15,7 @@ Valid username:
|
||||
- allowed characters: latin, digits, ._-
|
||||
*/
|
||||
/// validates username char[] and constructs str from it
|
||||
/// @return str_null on success, stack-allocated error message on fail
|
||||
/// @return str_null on success, heap-allocated error message on fail
|
||||
str validateUsername_cstr(char username[USERNAME_SIZE_MAX+1], str* out_username_str) ATTRIBUTE_WARN_UNUSED_RESULT;
|
||||
|
||||
str validateUsername_str(str username) ATTRIBUTE_WARN_UNUSED_RESULT;
|
||||
@@ -32,6 +32,10 @@ typedef enum PacketType {
|
||||
PacketType_LoginResponse,
|
||||
PacketType_RegisterRequest,
|
||||
PacketType_RegisterResponse,
|
||||
PacketType_SendMessageRequest,
|
||||
PacketType_SendMessageResponse,
|
||||
PacketType_GetMessageBlockRequest,
|
||||
PacketType_GetMessageBlockResponse,
|
||||
} ATTRIBUTE_PACKED PacketType;
|
||||
|
||||
|
||||
@@ -40,7 +44,7 @@ typedef enum PacketType {
|
||||
typedef struct ErrorMessage {
|
||||
u32 msg_size; // <= ERROR_MESSAGE_MAX_SIZE
|
||||
/* stream of size msg_size */
|
||||
} ErrorMessage;
|
||||
} ALIGN_PACKET_STRUCT ErrorMessage;
|
||||
|
||||
void ErrorMessage_construct(ErrorMessage* ptr, PacketHeader* header,
|
||||
u32 msg_size);
|
||||
@@ -55,11 +59,11 @@ Result(void) ClientHandshake_tryConstruct(ClientHandshake* ptr, PacketHeader* he
|
||||
|
||||
|
||||
typedef struct ServerHandshake {
|
||||
u64 session_id;
|
||||
i64 session_id;
|
||||
} ALIGN_PACKET_STRUCT ServerHandshake;
|
||||
|
||||
void ServerHandshake_construct(ServerHandshake* ptr, PacketHeader* header,
|
||||
u64 session_id);
|
||||
i64 session_id);
|
||||
|
||||
|
||||
typedef enum ServerPublicInfo {
|
||||
@@ -78,7 +82,7 @@ void ServerPublicInfoRequest_construct(ServerPublicInfoRequest* ptr, PacketHeade
|
||||
typedef struct ServerPublicInfoResponse {
|
||||
u32 data_size;
|
||||
/* stream of size data_size */
|
||||
} ServerPublicInfoResponse;
|
||||
} ALIGN_PACKET_STRUCT ServerPublicInfoResponse;
|
||||
|
||||
void ServerPublicInfoResponse_construct(ServerPublicInfoResponse* ptr, PacketHeader* header,
|
||||
u32 data_size);
|
||||
@@ -94,12 +98,12 @@ Result(void) LoginRequest_tryConstruct(LoginRequest* ptr, PacketHeader* header,
|
||||
|
||||
|
||||
typedef struct LoginResponse {
|
||||
u64 user_id;
|
||||
u64 landing_channel_id;
|
||||
i64 user_id;
|
||||
i64 landing_channel_id;
|
||||
} ALIGN_PACKET_STRUCT LoginResponse;
|
||||
|
||||
void LoginResponse_construct(LoginResponse* ptr, PacketHeader* header,
|
||||
u64 user_id, u64 landing_channel_id);
|
||||
i64 user_id, i64 landing_channel_id);
|
||||
|
||||
|
||||
typedef struct RegisterRequest {
|
||||
@@ -112,10 +116,114 @@ Result(void) RegisterRequest_tryConstruct(RegisterRequest* ptr, PacketHeader* he
|
||||
|
||||
|
||||
typedef struct RegisterResponse {
|
||||
u64 user_id;
|
||||
i64 user_id;
|
||||
} ALIGN_PACKET_STRUCT RegisterResponse;
|
||||
|
||||
void RegisterResponse_construct(RegisterResponse* ptr, PacketHeader* header,
|
||||
u64 user_id);
|
||||
i64 user_id);
|
||||
|
||||
|
||||
typedef struct MessageMeta {
|
||||
Magic32 magic;
|
||||
u16 data_size;
|
||||
i64 id;
|
||||
i64 sender_id;
|
||||
DateTime timestamp; /* UTC */
|
||||
} ATTRIBUTE_ALIGNED(8) MessageMeta;
|
||||
|
||||
#define MessageMeta_construct(DATA_SIZE, MESSAGE_ID, SENDER_ID, TIMESTAMP) ((MessageMeta){ \
|
||||
.magic = MESSAGE_MAGIC, \
|
||||
.data_size = DATA_SIZE, \
|
||||
.id = MESSAGE_ID, \
|
||||
.sender_id = SENDER_ID, \
|
||||
.timestamp = TIMESTAMP \
|
||||
})
|
||||
|
||||
#define MESSAGE_MAGIC ((Magic32){ .bytes = { 'M', 's', 'g', '1' } })
|
||||
|
||||
typedef struct MessageBlock {
|
||||
Array(u8) datum; // sequence(MessageMeta, byte[MessageMeta.data_size])
|
||||
u32 messages_count;
|
||||
u32 offset;
|
||||
} MessageBlock;
|
||||
|
||||
static inline void MessageBlock_construct(MessageBlock* self, Array(u8) datum, u32 messages_count){
|
||||
self->datum = datum;
|
||||
self->messages_count = messages_count;
|
||||
self->offset = 0;
|
||||
}
|
||||
|
||||
static inline void MessageBlock_alloc(MessageBlock* self){
|
||||
self->datum = Array_u8_alloc(MESSAGE_BLOCK_COUNT_MAX * (sizeof(MessageMeta) + MESSAGE_SIZE_MAX));
|
||||
Array_u8_memset(&self->datum, 0);
|
||||
self->messages_count = 0;
|
||||
self->offset = 0;
|
||||
}
|
||||
|
||||
static inline void MessageBlock_reset(MessageBlock* self){
|
||||
Array_u8_memset(&self->datum, 0);
|
||||
self->messages_count = 0;
|
||||
self->offset = 0;
|
||||
}
|
||||
|
||||
static inline void MessageBlock_destroy(MessageBlock* self){
|
||||
if(!self)
|
||||
return;
|
||||
Array_u8_destroy(&self->datum);
|
||||
}
|
||||
|
||||
/// @brief write msg_meta and msg_meta->data_size bytes from msg_content to block and increase block.messages_count
|
||||
/// @param block use MessageBlock_alloc() to create empty block
|
||||
/// @param msg_meta use MessageMeta_construct() to create message metadata
|
||||
/// @param msg_content array of size >= msg_meta.data_size
|
||||
/// @return false if msg_meta and msg_content don't fit in block.datum
|
||||
Result(bool) MessageBlock_writeMessage(MessageBlock* block,
|
||||
const MessageMeta* msg_meta, const Array(u8) msg_content);
|
||||
|
||||
/// @brief read msg_meta and msg_content from block and decrease block.messages_count
|
||||
/// @param block a block with correct .datum and .messages_count
|
||||
/// @param msg_meta out meta copied from block_data
|
||||
/// @param msg_content out content copied from block_data. Array of size >= MESSAGE_SIZE_MAX
|
||||
/// @return false if there are no messages to read (block.messages_count == 0)
|
||||
Result(bool) MessageBlock_readMessage(MessageBlock* block,
|
||||
MessageMeta* msg_meta, Array(u8) msg_content);
|
||||
|
||||
|
||||
typedef struct SendMessageRequest {
|
||||
i64 channel_id;
|
||||
u16 data_size;
|
||||
/* stream of size data_size */
|
||||
} ALIGN_PACKET_STRUCT SendMessageRequest;
|
||||
|
||||
void SendMessageRequest_construct(SendMessageRequest* ptr, PacketHeader* header,
|
||||
i64 channel_id, u16 data_size);
|
||||
|
||||
|
||||
typedef struct SendMessageResponse {
|
||||
i64 message_id;
|
||||
DateTime timestamp; /* UTC */
|
||||
} ALIGN_PACKET_STRUCT SendMessageResponse;
|
||||
|
||||
void SendMessageResponse_construct(SendMessageResponse* ptr, PacketHeader* header,
|
||||
i64 message_id, DateTime timestamp);
|
||||
|
||||
|
||||
typedef struct GetMessageBlockRequest {
|
||||
i64 channel_id;
|
||||
i64 first_message_id;
|
||||
u32 messages_count;
|
||||
} ALIGN_PACKET_STRUCT GetMessageBlockRequest;
|
||||
|
||||
void GetMessageBlockRequest_construct(GetMessageBlockRequest* ptr, PacketHeader* header,
|
||||
i64 channel_id, i64 first_message_id, u32 messages_count);
|
||||
|
||||
|
||||
typedef struct GetMessageBlockResponse {
|
||||
u32 messages_count;
|
||||
u32 data_size;
|
||||
/* stream of size data_size : sequence (MessageMeta, byte[MessageMeta.data_size]) */
|
||||
} ALIGN_PACKET_STRUCT GetMessageBlockResponse;
|
||||
|
||||
void GetMessageBlockResponse_construct(GetMessageBlockResponse* ptr, PacketHeader* header,
|
||||
u32 messages_count, u32 data_size);
|
||||
|
||||
|
||||
@@ -1,11 +1,14 @@
|
||||
#include "server.h"
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
#include "server/server_internal.h"
|
||||
|
||||
void ClientConnection_close(ClientConnection* conn){
|
||||
if(!conn)
|
||||
return;
|
||||
EncryptedSocketTCP_destroy(&conn->sock);
|
||||
free(conn->session_key.data);
|
||||
Array_u8_destroy(&conn->session_key);
|
||||
MessageBlock_destroy(&conn->message_block);
|
||||
Array_u8_destroy(&conn->message_content);
|
||||
ServerQueries_free(conn->queries);
|
||||
tsqlite_connection_close(conn->db);
|
||||
free(conn);
|
||||
}
|
||||
|
||||
@@ -14,22 +17,31 @@ Result(ClientConnection*) ClientConnection_accept(ConnectionHandlerArgs* args)
|
||||
Deferral(8);
|
||||
|
||||
ClientConnection* conn = (ClientConnection*)malloc(sizeof(ClientConnection));
|
||||
memset(conn, 0, sizeof(*conn));
|
||||
zeroStruct(conn);
|
||||
bool success = false;
|
||||
Defer(if(!success) ClientConnection_close(conn));
|
||||
|
||||
conn->server = args->server;
|
||||
conn->client_end = args->client_end;
|
||||
conn->session_id = args->session_id;
|
||||
conn->authorized = false;
|
||||
conn->session_key = Array_alloc_size(AES_SESSION_KEY_SIZE);
|
||||
|
||||
// buffers
|
||||
MessageBlock_alloc(&conn->message_block);
|
||||
conn->message_content = Array_u8_alloc(MESSAGE_SIZE_MAX);
|
||||
|
||||
// database
|
||||
try(conn->db, p, tsqlite_connection_open(args->server->db_path));
|
||||
try(conn->queries, p, ServerQueries_compile(conn->db));
|
||||
|
||||
// correct session key will be received from client later
|
||||
Array_memset(conn->session_key, 0);
|
||||
conn->session_key = Array_u8_alloc(AES_SESSION_KEY_SIZE);
|
||||
Array_u8_memset(&conn->session_key, 0);
|
||||
EncryptedSocketTCP_construct(&conn->sock, args->accepted_socket_tcp, NETWORK_BUFFER_SIZE, conn->session_key);
|
||||
try_void(socket_TCP_enableAliveChecks_default(args->accepted_socket_tcp));
|
||||
|
||||
// decrypt the rsa messages using server private key
|
||||
RSADecryptor rsa_dec;
|
||||
RSADecryptor_construct(&rsa_dec, &args->server->cred.rsa_sk);
|
||||
RSADecryptor_construct(&rsa_dec, &args->server->rsa_sk);
|
||||
|
||||
// receive PacketHeader
|
||||
PacketHeader packet_header;
|
||||
@@ -43,10 +55,10 @@ Result(ClientConnection*) ClientConnection_accept(ConnectionHandlerArgs* args)
|
||||
try_void(EncryptedSocketTCP_recvStructRSA(&conn->sock, &rsa_dec, &client_handshake));
|
||||
|
||||
// use received session key
|
||||
memcpy(conn->session_key.data, client_handshake.session_key, conn->session_key.size);
|
||||
memcpy(conn->session_key.data, client_handshake.session_key, conn->session_key.len);
|
||||
EncryptedSocketTCP_changeKey(&conn->sock, conn->session_key);
|
||||
|
||||
// send PacketHeader and ServerHandshake over encrypted TCP socket
|
||||
// send ServerHandshake
|
||||
ServerHandshake server_handshake;
|
||||
ServerHandshake_construct(&server_handshake, &packet_header,
|
||||
conn->session_id);
|
||||
|
||||
@@ -1,26 +0,0 @@
|
||||
#include "server.h"
|
||||
|
||||
|
||||
|
||||
Result(void) ServerCredentials_tryConstruct(ServerCredentials* cred,
|
||||
cstr rsa_sk_base64, cstr rsa_pk_base64)
|
||||
{
|
||||
Deferral(4);
|
||||
|
||||
memset(cred, 0, sizeof(*cred));
|
||||
bool success = false;
|
||||
Defer(if(!success) ServerCredentials_destroy(cred));
|
||||
|
||||
try_void(RSA_parsePrivateKey_base64(rsa_sk_base64, &cred->rsa_sk));
|
||||
try_void(RSA_parsePublicKey_base64(rsa_pk_base64, &cred->rsa_pk));
|
||||
|
||||
success = true;
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
void ServerCredentials_destroy(ServerCredentials* cred){
|
||||
if(!cred)
|
||||
return;
|
||||
RSA_destroyPrivateKey(&cred->rsa_sk);
|
||||
RSA_destroyPublicKey(&cred->rsa_pk);
|
||||
}
|
||||
110
src/server/db/Channel.c
Normal file
110
src/server/db/Channel.c
Normal file
@@ -0,0 +1,110 @@
|
||||
#include "server_db_internal.h"
|
||||
|
||||
Result(bool) Channel_exists(ServerQueries* q, i64 id){
|
||||
Deferral(4);
|
||||
|
||||
tsqlite_statement* st = q->channels.exists;
|
||||
Defer(tsqlite_statement_reset(st));
|
||||
try_void(tsqlite_statement_bind_i64(st, "$id", id));
|
||||
|
||||
try(bool has_result, i, tsqlite_statement_step(st));
|
||||
|
||||
Return RESULT_VALUE(i, has_result);
|
||||
}
|
||||
|
||||
Result(bool) Channel_createOrUpdate(ServerQueries* q,
|
||||
i64 id, str name, str description)
|
||||
{
|
||||
Deferral(4);
|
||||
try_assert(id > 0);
|
||||
try_assert(name.len >= CHANNEL_NAME_SIZE_MIN && name.len <= CHANNEL_NAME_SIZE_MAX);
|
||||
try_assert(description.len <= CHANNEL_DESC_SIZE_MAX);
|
||||
|
||||
try(bool channel_exists, i, Channel_exists(q, id));
|
||||
tsqlite_statement* st = NULL;
|
||||
Defer(tsqlite_statement_reset(st));
|
||||
if(channel_exists){
|
||||
st = q->channels.update;
|
||||
}
|
||||
else {
|
||||
st = q->channels.insert;
|
||||
}
|
||||
try_void(tsqlite_statement_bind_i64(st, "$id", id));
|
||||
try_void(tsqlite_statement_bind_str(st, "$name", name, NULL));
|
||||
try_void(tsqlite_statement_bind_str(st, "$description", description, NULL));
|
||||
try_void(tsqlite_statement_step(st));
|
||||
|
||||
Return RESULT_VALUE(i, !channel_exists);
|
||||
}
|
||||
|
||||
Result(void) Channel_saveMessage(ServerQueries* q,
|
||||
i64 channel_id, i64 sender_id, Array(u8) content,
|
||||
DateTime* out_timestamp)
|
||||
{
|
||||
Deferral(4);
|
||||
try_assert(content.len >= MESSAGE_SIZE_MIN && content.len <= MESSAGE_SIZE_MAX);
|
||||
|
||||
tsqlite_statement* st = q->messages.insert;
|
||||
Defer(tsqlite_statement_reset(st));
|
||||
try_void(tsqlite_statement_bind_i64(st, "$channel_id", channel_id));
|
||||
try_void(tsqlite_statement_bind_i64(st, "$sender_id", sender_id));
|
||||
try_void(tsqlite_statement_bind_blob(st, "$content", content, NULL));
|
||||
|
||||
try(bool has_result, i, tsqlite_statement_step(st));
|
||||
try_assert(has_result);
|
||||
|
||||
try(i64 message_id, i, tsqlite_statement_getResult_i64(st));
|
||||
str timestamp_str;
|
||||
try_void(tsqlite_statement_getResult_str(st, ×tamp_str));
|
||||
try_void(DateTime_parse(timestamp_str.data, out_timestamp));
|
||||
|
||||
Return RESULT_VALUE(i, message_id);
|
||||
}
|
||||
|
||||
Result(void) Channel_loadMessageBlock(ServerQueries* q,
|
||||
i64 channel_id, i64 first_message_id, u32 count,
|
||||
MessageBlock* block)
|
||||
{
|
||||
Deferral(4);
|
||||
if(count == 0){
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
try_assert(channel_id > 0);
|
||||
try_assert(block->datum.len >= count * (sizeof(MessageMeta) + MESSAGE_SIZE_MAX));
|
||||
|
||||
tsqlite_statement* st = q->messages.get_block;
|
||||
Defer(tsqlite_statement_reset(st));
|
||||
try_void(tsqlite_statement_bind_i64(st, "$channel_id", channel_id));
|
||||
try_void(tsqlite_statement_bind_i64(st, "$first_message_id", first_message_id));
|
||||
try_void(tsqlite_statement_bind_i64(st, "$count", count));
|
||||
|
||||
MessageBlock_reset(block);
|
||||
str tmp_str = str_null;
|
||||
while(true){
|
||||
try(bool has_result, i, tsqlite_statement_step(st));
|
||||
if(!has_result)
|
||||
break;
|
||||
|
||||
// id
|
||||
try(i64 message_id, i, tsqlite_statement_getResult_i64(st));
|
||||
// sender_id
|
||||
try(i64 sender_id, i, tsqlite_statement_getResult_i64(st));
|
||||
// content
|
||||
Array(u8) msg_content;
|
||||
try_void(tsqlite_statement_getResult_blob(st, &msg_content));
|
||||
// timestamp
|
||||
try_void(tsqlite_statement_getResult_str(st, &tmp_str));
|
||||
DateTime timestamp;
|
||||
try_void(DateTime_parse(tmp_str.data, ×tamp));
|
||||
|
||||
MessageMeta msg_meta = MessageMeta_construct(
|
||||
msg_content.len,
|
||||
message_id,
|
||||
sender_id,
|
||||
timestamp);
|
||||
try(bool write_success, u, MessageBlock_writeMessage(block, &msg_meta, msg_content));
|
||||
try_assert(write_success == true);
|
||||
}
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
50
src/server/db/User.c
Normal file
50
src/server/db/User.c
Normal file
@@ -0,0 +1,50 @@
|
||||
#include "server_db_internal.h"
|
||||
|
||||
Result(i64) User_findByUsername(ServerQueries* q, str username){
|
||||
Deferral(4);
|
||||
|
||||
tsqlite_statement* st = q->users.find_by_username;
|
||||
Defer(tsqlite_statement_reset(st));
|
||||
try_void(tsqlite_statement_bind_str(st, "$username", username, NULL));
|
||||
|
||||
try(bool has_result, i, tsqlite_statement_step(st));
|
||||
i64 user_id = 0;
|
||||
if(has_result){
|
||||
try(user_id, i, tsqlite_statement_getResult_i64(st));
|
||||
try_assert(user_id > 0);
|
||||
}
|
||||
|
||||
Return RESULT_VALUE(i, user_id);
|
||||
}
|
||||
|
||||
Result(i64) User_register(ServerQueries* q, str username, Array(u8) token){
|
||||
Deferral(4);
|
||||
try_assert(username.len >= USERNAME_SIZE_MIN && username.len <= USERNAME_SIZE_MAX);
|
||||
try_assert(token.len == PASSWORD_HASH_SIZE)
|
||||
|
||||
tsqlite_statement* st = q->users.insert;
|
||||
Defer(tsqlite_statement_reset(st));
|
||||
try_void(tsqlite_statement_bind_str(st, "$username", username, NULL));
|
||||
try_void(tsqlite_statement_bind_blob(st, "$token", token, NULL));
|
||||
|
||||
try(bool has_result, i, tsqlite_statement_step(st));
|
||||
try_assert(has_result);
|
||||
try(i64 user_id, i, tsqlite_statement_getResult_i64(st));
|
||||
try_assert(user_id > 0);
|
||||
|
||||
Return RESULT_VALUE(i, user_id);
|
||||
}
|
||||
|
||||
Result(bool) User_tryAuthorize(ServerQueries* q, u64 id, Array(u8) token){
|
||||
Deferral(4);
|
||||
try_assert(token.len == PASSWORD_HASH_SIZE)
|
||||
|
||||
tsqlite_statement* st = q->users.compare_token;
|
||||
Defer(tsqlite_statement_reset(st));
|
||||
try_void(tsqlite_statement_bind_i64(st, "$id", id));
|
||||
try_void(tsqlite_statement_bind_blob(st, "$token", token, NULL));
|
||||
|
||||
try(bool has_result, i, tsqlite_statement_step(st));
|
||||
|
||||
Return RESULT_VALUE(i, has_result);
|
||||
}
|
||||
153
src/server/db/server_db.c
Normal file
153
src/server/db/server_db.c
Normal file
@@ -0,0 +1,153 @@
|
||||
#include "server_db_internal.h"
|
||||
#include "tlibc/filesystem.h"
|
||||
|
||||
Result(tsqlite_connection*) ServerDatabase_open(cstr file_path){
|
||||
Deferral(64);
|
||||
|
||||
try_void(dir_createParent(file_path));
|
||||
try(tsqlite_connection* db, p, tsqlite_connection_open(file_path));
|
||||
bool success = false;
|
||||
Defer(if(!success) tsqlite_connection_close(db));
|
||||
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// CHANNELS //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
try(tsqlite_statement* create_table_channels, p, tsqlite_statement_compile(db, STR(
|
||||
"CREATE TABLE IF NOT EXISTS channels (\n"
|
||||
" id INTEGER PRIMARY KEY AUTOINCREMENT,\n"
|
||||
" name VARCHAR NOT NULL,\n"
|
||||
" description VARCHAR NOT NULL\n"
|
||||
");"
|
||||
)));
|
||||
Defer(tsqlite_statement_free(create_table_channels));
|
||||
try_void(tsqlite_statement_step(create_table_channels));
|
||||
|
||||
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// MESSAGES //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
try(tsqlite_statement* create_table_messages, p, tsqlite_statement_compile(db, STR(
|
||||
"CREATE TABLE IF NOT EXISTS messages (\n"
|
||||
" id INTEGER PRIMARY KEY AUTOINCREMENT,\n"
|
||||
" channel_id INTEGER NOT NULL REFERENCES channels(id),\n"
|
||||
" sender_id INTEGER NOT NULL REFERENCES users(id),\n"
|
||||
" content BLOB NOT NULL,\n"
|
||||
" timestamp DATETIME NOT NULL DEFAULT (\n"
|
||||
" strftime('"MESSAGE_TIMESTAMP_FMT_SQL"', 'now', 'utc', 'subsecond')\n"
|
||||
" )\n"
|
||||
");"
|
||||
)));
|
||||
Defer(tsqlite_statement_free(create_table_messages));
|
||||
try_void(tsqlite_statement_step(create_table_messages));
|
||||
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// USERS //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
try(tsqlite_statement* create_table_users, p, tsqlite_statement_compile(db, STR(
|
||||
"CREATE TABLE IF NOT EXISTS users (\n"
|
||||
" id INTEGER PRIMARY KEY AUTOINCREMENT,\n"
|
||||
" username VARCHAR NOT NULL,\n"
|
||||
" token BLOB NOT NULL,\n"
|
||||
" registration_time DATETIME NOT NULL DEFAULT (\n"
|
||||
" strftime('"MESSAGE_TIMESTAMP_FMT_SQL"', 'now', 'utc', 'subsecond')\n"
|
||||
" )\n"
|
||||
");"
|
||||
)));
|
||||
Defer(tsqlite_statement_free(create_table_users));
|
||||
try_void(tsqlite_statement_step(create_table_users));
|
||||
|
||||
try(tsqlite_statement* create_index_username, p, tsqlite_statement_compile(db, STR(
|
||||
"CREATE UNIQUE INDEX IF NOT EXISTS idx_users_username ON users(username);"
|
||||
)));
|
||||
Defer(tsqlite_statement_free(create_index_username));
|
||||
try_void(tsqlite_statement_step(create_index_username));
|
||||
|
||||
success = true;
|
||||
Return RESULT_VALUE(p, db);
|
||||
}
|
||||
|
||||
|
||||
|
||||
void ServerQueries_free(ServerQueries* q){
|
||||
if(!q)
|
||||
return;
|
||||
|
||||
tsqlite_statement_free(q->channels.insert);
|
||||
tsqlite_statement_free(q->channels.update);
|
||||
tsqlite_statement_free(q->channels.exists);
|
||||
|
||||
tsqlite_statement_free(q->messages.insert);
|
||||
tsqlite_statement_free(q->messages.get_block);
|
||||
|
||||
tsqlite_statement_free(q->users.insert);
|
||||
tsqlite_statement_free(q->users.find_by_username);
|
||||
tsqlite_statement_free(q->users.compare_token);
|
||||
|
||||
free(q);
|
||||
}
|
||||
|
||||
Result(ServerQueries*) ServerQueries_compile(tsqlite_connection* db){
|
||||
Deferral(4);
|
||||
|
||||
ServerQueries* q = (ServerQueries*)malloc(sizeof(*q));
|
||||
zeroStruct(q);
|
||||
bool success = false;
|
||||
Defer(if(!success) ServerQueries_free(q));
|
||||
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// CHANNELS //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
try(q->channels.insert, p, tsqlite_statement_compile(db, STR(
|
||||
"INSERT INTO\n"
|
||||
"channels (id, name, description)\n"
|
||||
"VALUES ($id, $name, $description);"
|
||||
)));
|
||||
|
||||
try(q->channels.exists, p, tsqlite_statement_compile(db, STR(
|
||||
"SELECT 1 FROM channels WHERE id = $id;"
|
||||
)));
|
||||
|
||||
try(q->channels.update, p, tsqlite_statement_compile(db, STR(
|
||||
"UPDATE channels\n"
|
||||
"SET name = $name, description = $description\n"
|
||||
"WHERE id = $id;"
|
||||
)));
|
||||
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// MESSAGES //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
try(q->messages.insert, p, tsqlite_statement_compile(db, STR(
|
||||
"INSERT INTO\n"
|
||||
"messages (channel_id, sender_id, content)\n"
|
||||
"VALUES ($channel_id, $sender_id, $content)\n"
|
||||
"RETURNING id, timestamp;"
|
||||
)));
|
||||
|
||||
try(q->messages.get_block, p, tsqlite_statement_compile(db, STR(
|
||||
"SELECT id, sender_id, content, timestamp FROM messages\n"
|
||||
"WHERE id >= $first_message_id\n"
|
||||
"AND channel_id = $channel_id\n"
|
||||
"LIMIT $count;"
|
||||
)));
|
||||
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
// USERS //
|
||||
///////////////////////////////////////////////////////////////////////////
|
||||
try(q->users.insert, p, tsqlite_statement_compile(db, STR(
|
||||
"INSERT INTO\n"
|
||||
"users (username, token)\n"
|
||||
"VALUES ($username, $token)\n"
|
||||
"RETURNING id, registration_time;"
|
||||
)));
|
||||
|
||||
try(q->users.find_by_username, p, tsqlite_statement_compile(db, STR(
|
||||
"SELECT id FROM users WHERE username = $username;"
|
||||
)));
|
||||
|
||||
try(q->users.compare_token, p, tsqlite_statement_compile(db, STR(
|
||||
"SELECT 1 FROM users WHERE id = $id AND token = $token;"
|
||||
)));
|
||||
|
||||
success = true;
|
||||
Return RESULT_VALUE(p, q);
|
||||
}
|
||||
39
src/server/db/server_db.h
Normal file
39
src/server/db/server_db.h
Normal file
@@ -0,0 +1,39 @@
|
||||
#pragma once
|
||||
#include "tcp-chat.h"
|
||||
#include "tsqlite.h"
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
|
||||
/// @brief open DB and create tables
|
||||
Result(tsqlite_connection*) ServerDatabase_open(cstr file_path);
|
||||
|
||||
typedef struct ServerQueries ServerQueries;
|
||||
Result(ServerQueries*) ServerQueries_compile(tsqlite_connection* db);
|
||||
void ServerQueries_free(ServerQueries* self);
|
||||
|
||||
|
||||
Result(bool) Channel_exists(ServerQueries* q, i64 id);
|
||||
|
||||
/// @return true if new row was created
|
||||
Result(bool) Channel_createOrUpdate(ServerQueries* q,
|
||||
i64 id, str name, str description);
|
||||
|
||||
/// @return new message id
|
||||
Result(i64) Channel_saveMessage(ServerQueries* q,
|
||||
i64 channel_id, i64 sender_id, Array(u8) content,
|
||||
DateTime* out_timestamp_utc);
|
||||
|
||||
/// @brief try to find count messages with id >= first_message_id
|
||||
/// @param dst_block writes messages here. messages_count can be 0 if no messages were found
|
||||
Result(void) Channel_loadMessageBlock(ServerQueries* q,
|
||||
i64 channel_id, i64 first_message_id, u32 count,
|
||||
MessageBlock* dst_block);
|
||||
|
||||
|
||||
/// @return existing user id or 0
|
||||
Result(i64) User_findByUsername(ServerQueries* q, str username);
|
||||
|
||||
/// @return new user id
|
||||
Result(i64) User_register(ServerQueries* q, str username, Array(u8) token);
|
||||
|
||||
/// @return true for successful authorization
|
||||
Result(bool) User_tryAuthorize(ServerQueries* q, u64 id, Array(u8) token);
|
||||
27
src/server/db/server_db_internal.h
Normal file
27
src/server/db/server_db_internal.h
Normal file
@@ -0,0 +1,27 @@
|
||||
#pragma once
|
||||
#include "server_db.h"
|
||||
|
||||
typedef struct ServerQueries {
|
||||
struct {
|
||||
/* ($id, $name, $description) -> void */
|
||||
tsqlite_statement* insert;
|
||||
/* ($id, $name, $description) -> void */
|
||||
tsqlite_statement* update;
|
||||
/* ($id) -> 1 or nothing */
|
||||
tsqlite_statement* exists;
|
||||
} channels;
|
||||
struct {
|
||||
/* ($channel_id, $sender_id, $content) -> (id, timestamp) */
|
||||
tsqlite_statement* insert;
|
||||
/* ($channel_id, $first_message_id, $count) -> [(id, sender_id, content, timestamp)] */
|
||||
tsqlite_statement* get_block;
|
||||
} messages;
|
||||
struct {
|
||||
/* ($username, $token) -> (id, registration_time) */
|
||||
tsqlite_statement* insert;
|
||||
/* ($username) -> (id) */
|
||||
tsqlite_statement* find_by_username;
|
||||
/* ($id, $token) -> 1 or nothing */
|
||||
tsqlite_statement* compare_token;
|
||||
} users;
|
||||
} ServerQueries;
|
||||
@@ -1,17 +0,0 @@
|
||||
#pragma once
|
||||
#include "common_constants.h"
|
||||
#include "tlibc/time.h"
|
||||
|
||||
typedef struct User {
|
||||
u16 name_len;
|
||||
char name[USERNAME_SIZE_MAX + 1]; // null-terminated
|
||||
u8 token_hash[PASSWORD_HASH_SIZE]; // token is hashed again on server side
|
||||
DateTime registration_time;
|
||||
} ATTRIBUTE_ALIGNED(256) User;
|
||||
|
||||
typedef struct Channel {
|
||||
u16 name_len;
|
||||
u16 desc_len;
|
||||
char name[CHANNEL_NAME_MAX + 1];
|
||||
char desc[CHANNEL_DESC_MAX + 1];
|
||||
} ATTRIBUTE_ALIGNED(16*1024) Channel;
|
||||
@@ -1,77 +0,0 @@
|
||||
#include "request_handlers.h"
|
||||
|
||||
|
||||
declare_RequestHandler(Login)
|
||||
{
|
||||
Deferral(4);
|
||||
logInfo(log_ctx, "requested %s", req_type_name);
|
||||
|
||||
// receive request
|
||||
LoginRequest req;
|
||||
try_void(PacketHeader_validateContentSize(req_head, sizeof(req)));
|
||||
try_void(EncryptedSocketTCP_recvStruct(&conn->sock, &req));
|
||||
|
||||
if(conn->authorized){
|
||||
try_void(sendErrorMessage(log_ctx, false, conn, res_head,
|
||||
STR("is logged in already")));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// validate username
|
||||
str username_str = str_null;
|
||||
str username_check_error = validateUsername_cstr(req.username, &username_str);
|
||||
if(username_check_error.data){
|
||||
try_void(sendErrorMessage(log_ctx, false, conn, res_head, username_check_error));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// cakculate hash of received token
|
||||
u8 token_hash[PASSWORD_HASH_SIZE];
|
||||
hash_password(
|
||||
Array_construct_size(req.token, sizeof(req.token)),
|
||||
token_hash,
|
||||
PASSWORD_HASH_LVL_ROUNDS
|
||||
);
|
||||
|
||||
// lock users cache
|
||||
try_stderrcode(pthread_mutex_lock(&server->users_cache_mutex));
|
||||
bool unlocked_users_cache_mutex = false;
|
||||
Defer(if(!unlocked_users_cache_mutex) pthread_mutex_unlock(&server->users_cache_mutex));
|
||||
|
||||
// try get id from name cache
|
||||
u64* id_ptr = HashMap_tryGetPtr(&server->users_name_id_map, username_str);
|
||||
if(id_ptr == NULL){
|
||||
try_void(sendErrorMessage_f(log_ctx, false, conn, res_head,
|
||||
"Username '%s' is not registered\n",
|
||||
username_str.data));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
u64 user_id = *id_ptr;
|
||||
|
||||
// get user by id
|
||||
try_assert(List_len(server->users_cache_list, User) < user_id);
|
||||
User* u = &List_index(server->users_cache_list, User, user_id);
|
||||
|
||||
// validate token hash
|
||||
if(memcmp(token_hash, u->token_hash, sizeof(token_hash)) != 0){
|
||||
try_void(sendErrorMessage(log_ctx, false, conn, res_head,
|
||||
STR("wrong password")));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// manually unlock mutex
|
||||
pthread_mutex_unlock(&server->users_cache_mutex);
|
||||
unlocked_users_cache_mutex = true;
|
||||
|
||||
// authorize
|
||||
conn->authorized = true;
|
||||
logInfo(log_ctx, "authorized user '%s'", username_str.data);
|
||||
|
||||
// send response
|
||||
LoginResponse res;
|
||||
LoginResponse_construct(&res, res_head, user_id, server->landing_channel_id);
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, res_head));
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, &res));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
@@ -1,65 +0,0 @@
|
||||
#include "request_handlers.h"
|
||||
|
||||
declare_RequestHandler(Register)
|
||||
{
|
||||
Deferral(4);
|
||||
logInfo(log_ctx, "requested %s", req_type_name);
|
||||
|
||||
// receive request
|
||||
RegisterRequest req;
|
||||
try_void(PacketHeader_validateContentSize(req_head, sizeof(req)));
|
||||
try_void(EncryptedSocketTCP_recvStruct(&conn->sock, &req));
|
||||
|
||||
// validate username
|
||||
str username_str = str_null;
|
||||
str username_check_error = validateUsername_cstr(req.username, &username_str);
|
||||
if(username_check_error.data){
|
||||
try_void(sendErrorMessage(log_ctx, false, conn, res_head, username_check_error));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// lock users cache
|
||||
try_stderrcode(pthread_mutex_lock(&server->users_cache_mutex));
|
||||
bool unlocked_users_cache_mutex = false;
|
||||
Defer(if(!unlocked_users_cache_mutex) pthread_mutex_unlock(&server->users_cache_mutex));
|
||||
|
||||
// check if name is taken
|
||||
if(HashMap_tryGetPtr(&server->users_name_id_map, username_str) != NULL){
|
||||
try_void(sendErrorMessage_f(log_ctx, false, conn, res_head,
|
||||
"Username'%s' already exists\n",
|
||||
username_str.data));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// initialize new user
|
||||
User user;
|
||||
memset(&user, 0, sizeof(User));
|
||||
memcpy(user.name, username_str.data, username_str.size + 1);
|
||||
user.name_len = username_str.size;
|
||||
hash_password(
|
||||
Array_construct_size(req.token, sizeof(req.token)),
|
||||
user.token_hash,
|
||||
PASSWORD_HASH_LVL_ROUNDS
|
||||
);
|
||||
DateTime_getUTC(&user.registration_time);
|
||||
|
||||
// save new user to db and cache
|
||||
try(u64 user_id, u, idb_pushRow(server->db_users_table, &user));
|
||||
try_assert(List_len(server->users_cache_list, User) == user_id);
|
||||
List_push(&server->users_cache_list, User, user);
|
||||
try_assert(HashMap_tryPush(&server->users_name_id_map, username_str, &user_id));
|
||||
|
||||
// manually unlock mutex
|
||||
pthread_mutex_unlock(&server->users_cache_mutex);
|
||||
unlocked_users_cache_mutex = true;
|
||||
|
||||
logInfo(log_ctx, "registered user '%s'", username_str.data);
|
||||
|
||||
// send response
|
||||
RegisterResponse res;
|
||||
RegisterResponse_construct(&res, res_head, user_id);
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, res_head));
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, &res));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
@@ -1,34 +0,0 @@
|
||||
#pragma once
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
#include "server/server.h"
|
||||
#include "log.h"
|
||||
|
||||
|
||||
Result(void) sendErrorMessage(cstr log_ctx, bool logAsError,
|
||||
ClientConnection* conn, PacketHeader* res_head,
|
||||
str msg);
|
||||
|
||||
Result(void) __sendErrorMessage_fv(cstr log_ctx, bool logAsError,
|
||||
ClientConnection* conn, PacketHeader* res_head,
|
||||
cstr format, va_list argv);
|
||||
|
||||
Result(void) sendErrorMessage_f(cstr log_ctx, bool logAsError,
|
||||
ClientConnection* conn, PacketHeader* res_head,
|
||||
cstr format, ...) ATTRIBUTE_CHECK_FORMAT_PRINTF(5, 6);
|
||||
|
||||
|
||||
#define declare_RequestHandler(TYPE) \
|
||||
Result(void) handleRequest_##TYPE( \
|
||||
Server* server, cstr log_ctx, cstr req_type_name, \
|
||||
ClientConnection* conn, PacketHeader* req_head, PacketHeader* res_head)
|
||||
|
||||
#define case_handleRequest(TYPE) \
|
||||
case PacketType_##TYPE##Request:\
|
||||
try_void(handleRequest_##TYPE(args->server, log_ctx, #TYPE, conn, &req_head, &res_head));\
|
||||
break;
|
||||
|
||||
declare_RequestHandler(ServerPublicInfo);
|
||||
declare_RequestHandler(Login);
|
||||
declare_RequestHandler(Register);
|
||||
|
||||
|
||||
@@ -1,54 +0,0 @@
|
||||
#include "request_handlers.h"
|
||||
#include "log.h"
|
||||
|
||||
Result(void) sendErrorMessage(cstr log_ctx, bool logAsError,
|
||||
ClientConnection* conn, PacketHeader* res_head,
|
||||
str msg)
|
||||
{
|
||||
Deferral(1);
|
||||
|
||||
//limit ErrorMessage size to fit into EncryptedSocketTCP.internal_buffer_size
|
||||
if(msg.size > ERROR_MESSAGE_MAX_SIZE)
|
||||
msg.size = ERROR_MESSAGE_MAX_SIZE;
|
||||
|
||||
if(logAsError){
|
||||
logError(log_ctx, FMT_str, msg.size, msg.data);
|
||||
} else {
|
||||
logWarn(log_ctx, FMT_str, msg.size, msg.data);
|
||||
}
|
||||
|
||||
ErrorMessage res;
|
||||
ErrorMessage_construct(&res, res_head, msg.size);
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, res_head));
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, &res));
|
||||
try_void(EncryptedSocketTCP_send(&conn->sock, str_castTo_Array(msg)));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) __sendErrorMessage_fv(cstr log_ctx, bool logAsError,
|
||||
ClientConnection* conn, PacketHeader* res_head,
|
||||
cstr format, va_list argv)
|
||||
{
|
||||
Deferral(4);
|
||||
|
||||
str msg = str_from_cstr(vsprintf_malloc(format, argv));
|
||||
Defer(free(msg.data));
|
||||
try_void(sendErrorMessage(log_ctx, logAsError, conn, res_head, msg));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) sendErrorMessage_f(cstr log_ctx, bool logAsError,
|
||||
ClientConnection* conn, PacketHeader* res_head,
|
||||
cstr format, ...)
|
||||
{
|
||||
Deferral(1);
|
||||
|
||||
va_list argv;
|
||||
va_start(argv, format);
|
||||
Defer(va_end(argv));
|
||||
try_void(__sendErrorMessage_fv(log_ctx, logAsError, conn, res_head, format, argv));
|
||||
|
||||
return RESULT_VOID;
|
||||
}
|
||||
57
src/server/responses/GetMessageBlock.c
Normal file
57
src/server/responses/GetMessageBlock.c
Normal file
@@ -0,0 +1,57 @@
|
||||
#include "responses.h"
|
||||
|
||||
#define srv conn->server
|
||||
#define LOGGER srv->logger
|
||||
#define LOG_FUNC srv->log_func
|
||||
#define LOG_CONTEXT log_ctx
|
||||
|
||||
declare_RequestHandler(GetMessageBlock)
|
||||
{
|
||||
Deferral(4);
|
||||
logInfo("requested %s", req_type_name);
|
||||
|
||||
// receive request
|
||||
GetMessageBlockRequest req;
|
||||
try_void(PacketHeader_validateContentSize(req_head, sizeof(req)));
|
||||
try_void(EncryptedSocketTCP_recvStruct(&conn->sock, &req));
|
||||
|
||||
if(!conn->authorized){
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, STR("not authorized") ));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// validate messages_count
|
||||
if(req.messages_count < 1 || req.messages_count > MESSAGE_BLOCK_COUNT_MAX){
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, STR("invalid message count in request") ));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// validate channel id
|
||||
try(bool channel_exists, i, Channel_exists(conn->queries, req.channel_id));
|
||||
if(!channel_exists){
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, STR("invalid channel id") ));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// get message block from channel
|
||||
try_void(Channel_loadMessageBlock(conn->queries,
|
||||
req.channel_id, req.first_message_id, req.messages_count,
|
||||
&conn->message_block));
|
||||
|
||||
// send response
|
||||
GetMessageBlockResponse res;
|
||||
GetMessageBlockResponse_construct(&res, res_head,
|
||||
conn->message_block.messages_count, conn->message_block.offset);
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, res_head));
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, &res));
|
||||
if(conn->message_block.offset != 0){
|
||||
try_void(EncryptedSocketTCP_send(&conn->sock,
|
||||
Array_u8_sliceTo(conn->message_block.datum, conn->message_block.offset))
|
||||
);
|
||||
}
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
64
src/server/responses/Login.c
Normal file
64
src/server/responses/Login.c
Normal file
@@ -0,0 +1,64 @@
|
||||
#include "responses.h"
|
||||
|
||||
#define srv conn->server
|
||||
#define LOGGER srv->logger
|
||||
#define LOG_FUNC srv->log_func
|
||||
#define LOG_CONTEXT log_ctx
|
||||
|
||||
declare_RequestHandler(Login)
|
||||
{
|
||||
Deferral(4);
|
||||
logInfo("requested %s", req_type_name);
|
||||
|
||||
// receive request
|
||||
LoginRequest req;
|
||||
try_void(PacketHeader_validateContentSize(req_head, sizeof(req)));
|
||||
try_void(EncryptedSocketTCP_recvStruct(&conn->sock, &req));
|
||||
|
||||
if(conn->authorized){
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, STR("is authorized in already") ));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// validate username
|
||||
str username = str_null;
|
||||
str name_error_str = validateUsername_cstr(req.username, &username);
|
||||
if(name_error_str.data){
|
||||
Defer(str_destroy(name_error_str));
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, name_error_str));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// get user by id
|
||||
try(u64 user_id, i, User_findByUsername(conn->queries, username));
|
||||
if(user_id == 0){
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, STR("Username is not registered") ));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// TODO: get user token
|
||||
Array(u8) token = Array_u8_construct(req.token, sizeof(req.token));
|
||||
try(bool authorized, i, User_tryAuthorize(conn->queries, user_id, token));
|
||||
// validate token hash
|
||||
if(!authorized){
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, STR("wrong password") ));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// authorize
|
||||
conn->authorized = true;
|
||||
conn->user_id = user_id;
|
||||
logInfo("authorized user '%s' with id "FMT_i64, username.data, user_id);
|
||||
|
||||
// send response
|
||||
LoginResponse res;
|
||||
LoginResponse_construct(&res, res_head, user_id, srv->landing_channel_id);
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, res_head));
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, &res));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
55
src/server/responses/Register.c
Normal file
55
src/server/responses/Register.c
Normal file
@@ -0,0 +1,55 @@
|
||||
#include "responses.h"
|
||||
|
||||
#define srv conn->server
|
||||
#define LOGGER srv->logger
|
||||
#define LOG_FUNC srv->log_func
|
||||
#define LOG_CONTEXT log_ctx
|
||||
|
||||
declare_RequestHandler(Register)
|
||||
{
|
||||
Deferral(4);
|
||||
logInfo("requested %s", req_type_name);
|
||||
|
||||
// receive request
|
||||
RegisterRequest req;
|
||||
try_void(PacketHeader_validateContentSize(req_head, sizeof(req)));
|
||||
try_void(EncryptedSocketTCP_recvStruct(&conn->sock, &req));
|
||||
|
||||
if(conn->authorized){
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, STR("is authorized in already") ));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// validate username
|
||||
str username = str_null;
|
||||
str name_error_str = validateUsername_cstr(req.username, &username);
|
||||
if(name_error_str.data){
|
||||
Defer(str_destroy(name_error_str));
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, name_error_str));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// check if name is taken
|
||||
try(u64 user_id, i, User_findByUsername(conn->queries, username));
|
||||
if(user_id != 0){
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, STR("Username is already taken") ));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// register new user
|
||||
Array(u8) token = Array_u8_construct(req.token, sizeof(req.token));
|
||||
try(user_id, i, User_register(conn->queries, username, token));
|
||||
logInfo("registered user '"FMT_str"' with id "FMT_i64,
|
||||
str_unwrap(username), user_id);
|
||||
|
||||
// send response
|
||||
RegisterResponse res;
|
||||
RegisterResponse_construct(&res, res_head, user_id);
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, res_head));
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, &res));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
57
src/server/responses/SendMessage.c
Normal file
57
src/server/responses/SendMessage.c
Normal file
@@ -0,0 +1,57 @@
|
||||
#include "responses.h"
|
||||
|
||||
#define srv conn->server
|
||||
#define LOGGER srv->logger
|
||||
#define LOG_FUNC srv->log_func
|
||||
#define LOG_CONTEXT log_ctx
|
||||
|
||||
declare_RequestHandler(SendMessage)
|
||||
{
|
||||
Deferral(4);
|
||||
logInfo("requested %s", req_type_name);
|
||||
|
||||
// receive request
|
||||
SendMessageRequest req;
|
||||
try_void(PacketHeader_validateContentSize(req_head, sizeof(req)));
|
||||
try_void(EncryptedSocketTCP_recvStruct(&conn->sock, &req));
|
||||
|
||||
if(!conn->authorized){
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, STR("not authorized") ));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// validate content size
|
||||
if(req.data_size < MESSAGE_SIZE_MIN || req.data_size > MESSAGE_SIZE_MAX){
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, STR("invalid message size") ));
|
||||
// close socket connection to reject incoming data
|
||||
Return RESULT_ERROR_CODE_FMT(TcpChat, TcpChatError_RejectIncoming, "invalid message size: %u", req.data_size);
|
||||
}
|
||||
|
||||
// receive message data
|
||||
try_void(EncryptedSocketTCP_recv(&conn->sock, conn->message_content, SocketRecvFlag_WholeBuffer));
|
||||
|
||||
// validate channel id
|
||||
try(bool channel_exists, i, Channel_exists(conn->queries, req.channel_id));
|
||||
if(!channel_exists){
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn, STR("invalid channel id") ));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
// save message to channel
|
||||
DateTime timestamp;
|
||||
try(i64 message_id, i, Channel_saveMessage(conn->queries,
|
||||
req.channel_id, conn->user_id, conn->message_content,
|
||||
×tamp));
|
||||
|
||||
// send response
|
||||
SendMessageResponse res;
|
||||
SendMessageResponse_construct(&res, res_head,
|
||||
message_id, timestamp);
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, res_head));
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, &res));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
@@ -1,9 +1,14 @@
|
||||
#include "request_handlers.h"
|
||||
#include "responses.h"
|
||||
|
||||
#define srv conn->server
|
||||
#define LOGGER srv->logger
|
||||
#define LOG_FUNC srv->log_func
|
||||
#define LOG_CONTEXT log_ctx
|
||||
|
||||
declare_RequestHandler(ServerPublicInfo)
|
||||
{
|
||||
Deferral(4);
|
||||
logInfo(log_ctx, "requested %s", req_type_name);
|
||||
logInfo("requested %s", req_type_name);
|
||||
|
||||
// receive request
|
||||
ServerPublicInfoRequest req;
|
||||
@@ -14,22 +19,23 @@ declare_RequestHandler(ServerPublicInfo)
|
||||
Array(u8) content;
|
||||
switch(req.property){
|
||||
default:{
|
||||
try_void(sendErrorMessage_f(log_ctx, false, conn, res_head,
|
||||
try_void(sendErrorMessage_f(log_ctx, conn, res_head,
|
||||
LogSeverity_Warn,
|
||||
"Unknown ServerPublicInfo property %u",
|
||||
req.property));
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
case ServerPublicInfo_Name:
|
||||
content = str_castTo_Array(server->name);
|
||||
content = str_castTo_Array_u8(srv->name);
|
||||
break;
|
||||
case ServerPublicInfo_Description:
|
||||
content = str_castTo_Array(server->name);
|
||||
content = str_castTo_Array_u8(srv->description);
|
||||
break;
|
||||
}
|
||||
|
||||
// send response
|
||||
ServerPublicInfoResponse res;
|
||||
ServerPublicInfoResponse_construct(&res, res_head, content.size);
|
||||
ServerPublicInfoResponse_construct(&res, res_head, content.len);
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, res_head));
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, &res));
|
||||
try_void(EncryptedSocketTCP_send(&conn->sock, content));
|
||||
30
src/server/responses/responses.h
Normal file
30
src/server/responses/responses.h
Normal file
@@ -0,0 +1,30 @@
|
||||
#pragma once
|
||||
#include "server/server_internal.h"
|
||||
|
||||
Result(void) sendErrorMessage(
|
||||
cstr log_ctx, ClientConnection* conn, PacketHeader* res_head,
|
||||
LogSeverity log_severity, str msg);
|
||||
|
||||
Result(void) __sendErrorMessage_fv(
|
||||
cstr log_ctx, ClientConnection* conn, PacketHeader* res_head,
|
||||
LogSeverity log_severity, cstr format, va_list argv);
|
||||
|
||||
Result(void) sendErrorMessage_f(
|
||||
cstr log_ctx, ClientConnection* conn, PacketHeader* res_head,
|
||||
LogSeverity log_severity, cstr format, ...) ATTRIBUTE_CHECK_FORMAT_PRINTF(5, 6);
|
||||
|
||||
|
||||
#define declare_RequestHandler(TYPE) \
|
||||
Result(void) handleRequest_##TYPE(cstr log_ctx, cstr req_type_name, \
|
||||
ClientConnection* conn, PacketHeader* req_head, PacketHeader* res_head)
|
||||
|
||||
#define case_handleRequest(TYPE) \
|
||||
case PacketType_##TYPE##Request:\
|
||||
try_void(handleRequest_##TYPE(log_ctx, #TYPE, conn, &req_head, &res_head));\
|
||||
break;
|
||||
|
||||
declare_RequestHandler(ServerPublicInfo);
|
||||
declare_RequestHandler(Login);
|
||||
declare_RequestHandler(Register);
|
||||
declare_RequestHandler(SendMessage);
|
||||
declare_RequestHandler(GetMessageBlock);
|
||||
55
src/server/responses/send_error.c
Normal file
55
src/server/responses/send_error.c
Normal file
@@ -0,0 +1,55 @@
|
||||
#include "responses.h"
|
||||
|
||||
#define srv conn->server
|
||||
#define LOGGER srv->logger
|
||||
#define LOG_FUNC srv->log_func
|
||||
#define LOG_CONTEXT log_ctx
|
||||
|
||||
Result(void) sendErrorMessage(
|
||||
cstr log_ctx, ClientConnection* conn, PacketHeader* res_head,
|
||||
LogSeverity log_severity, str msg)
|
||||
{
|
||||
Deferral(4);
|
||||
|
||||
//limit ErrorMessage size to fit into EncryptedSocketTCP.internal_buffer_size
|
||||
if(msg.len > ERROR_MESSAGE_MAX_SIZE)
|
||||
msg.len = ERROR_MESSAGE_MAX_SIZE;
|
||||
|
||||
log(log_severity, FMT_str, msg.len, msg.data);
|
||||
|
||||
ErrorMessage res;
|
||||
ErrorMessage_construct(&res, res_head, msg.len);
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, res_head));
|
||||
try_void(EncryptedSocketTCP_sendStruct(&conn->sock, &res));
|
||||
try_void(EncryptedSocketTCP_send(&conn->sock, str_castTo_Array_u8(msg)));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) __sendErrorMessage_fv(
|
||||
cstr log_ctx, ClientConnection* conn, PacketHeader* res_head,
|
||||
LogSeverity log_severity, cstr format, va_list argv)
|
||||
{
|
||||
Deferral(4);
|
||||
|
||||
str msg = str_from_cstr(vsprintf_malloc(format, argv));
|
||||
Defer(free(msg.data));
|
||||
try_void(sendErrorMessage(log_ctx, conn, res_head, log_severity, msg));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
Result(void) sendErrorMessage_f(
|
||||
cstr log_ctx,
|
||||
ClientConnection* conn, PacketHeader* res_head,
|
||||
LogSeverity log_severity, cstr format, ...)
|
||||
{
|
||||
Deferral(4);
|
||||
|
||||
va_list argv;
|
||||
va_start(argv, format);
|
||||
Defer(va_end(argv));
|
||||
try_void(__sendErrorMessage_fv(log_ctx, conn, res_head, log_severity, format, argv));
|
||||
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
@@ -1,9 +1,14 @@
|
||||
#include "request_handlers.h"
|
||||
#include "responses.h"
|
||||
|
||||
#define srv conn->server
|
||||
#define LOGGER srv->logger
|
||||
#define LOG_FUNC srv->log_func
|
||||
#define LOG_CONTEXT log_ctx
|
||||
|
||||
declare_RequestHandler(NAME)
|
||||
{
|
||||
Deferral(4);
|
||||
logInfo(log_ctx, "requested %s", req_type_name);
|
||||
logInfo("requested %s", req_type_name);
|
||||
|
||||
// receive request
|
||||
NAME##Request req;
|
||||
@@ -1,127 +1,140 @@
|
||||
#include <pthread.h>
|
||||
#include "tlibc/filesystem.h"
|
||||
#include "tlibc/time.h"
|
||||
#include "tlibc/base64.h"
|
||||
#include "server.h"
|
||||
#include "config.h"
|
||||
#include "log.h"
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
#include "server/request_handlers/request_handlers.h"
|
||||
#include "server/server_internal.h"
|
||||
#include "server/responses/responses.h"
|
||||
#include "tlibtoml.h"
|
||||
|
||||
static void* handleConnection(void* _args);
|
||||
static Result(void) try_handleConnection(ConnectionHandlerArgs* args, cstr log_ctx);
|
||||
|
||||
void Server_free(Server* server){
|
||||
if(!server)
|
||||
void Server_free(Server* self){
|
||||
if(!self)
|
||||
return;
|
||||
free(server->name.data);
|
||||
free(server->description.data);
|
||||
ServerCredentials_destroy(&server->cred);
|
||||
idb_close(server->db);
|
||||
pthread_mutex_destroy(&server->users_cache_mutex);
|
||||
free(server->users_cache_list.data);
|
||||
HashMap_destroy(&server->users_name_id_map);
|
||||
|
||||
str_destroy(self->name);
|
||||
str_destroy(self->description);
|
||||
RSA_destroyPrivateKey(&self->rsa_sk);
|
||||
RSA_destroyPublicKey(&self->rsa_pk);
|
||||
|
||||
free(self->db_path);
|
||||
ServerQueries_free(self->queries);
|
||||
tsqlite_connection_close(self->db);
|
||||
|
||||
free(self);
|
||||
}
|
||||
|
||||
Result(Server*) Server_createFromConfig(cstr config_path){
|
||||
|
||||
#define LOGGER logger
|
||||
#define LOG_FUNC log_func
|
||||
#define LOG_CONTEXT log_ctx
|
||||
|
||||
Result(Server*) Server_create(str config_file_content, cstr config_file_name,
|
||||
void* logger, LogFunction_t log_func)
|
||||
{
|
||||
Deferral(16);
|
||||
cstr log_ctx = "ServerInit";
|
||||
logInfo(log_ctx, "parsing config");
|
||||
|
||||
Server* server = (Server*)malloc(sizeof(Server));
|
||||
memset(server, 0, sizeof(Server));
|
||||
Server* self = (Server*)malloc(sizeof(Server));
|
||||
zeroStruct(self);
|
||||
bool success = false;
|
||||
Defer(if(!success) Server_free(server));
|
||||
Defer(if(!success) Server_free(self));
|
||||
|
||||
// open file
|
||||
try(FILE* config_file, p, file_open(config_path, FO_ReadExisting));
|
||||
Defer(file_close(config_file));
|
||||
// read whole file into Array(char)
|
||||
try(i64 config_file_size, i, file_getSize(config_file));
|
||||
Array(char) config_buf = Array_alloc(char, config_file_size);
|
||||
Defer(free(config_buf.data));
|
||||
try_void(file_readBytesArray(config_file, config_buf));
|
||||
str config_str = Array_castTo_str(config_buf, false);
|
||||
self->logger = logger;
|
||||
self->log_func = log_func;
|
||||
|
||||
// parse name
|
||||
str tmp_str = str_null;
|
||||
try_void(config_findValue(config_str, STR("name"), &tmp_str, true));
|
||||
server->name = str_copy(tmp_str);
|
||||
logDebug("parsing config");
|
||||
try(TomlTable* config_top, p, toml_load_str_filename(config_file_content, config_file_name));
|
||||
Defer(TomlTable_free(config_top));
|
||||
|
||||
// parse description
|
||||
try_void(config_findValue(config_str, STR("description"), &tmp_str, true));
|
||||
server->description = str_copy(tmp_str);
|
||||
// [server]
|
||||
try(TomlTable* config_server, p, TomlTable_get_table(config_top, STR("server")))
|
||||
// name
|
||||
try(str* v_name, p, TomlTable_get_str(config_server, STR("name")));
|
||||
self->name = str_copy(*v_name);
|
||||
|
||||
// parse landing_channel_id
|
||||
try_void(config_findValue(config_str, STR("landing_channel_id"), &tmp_str, true));
|
||||
char* lci_cstr = str_copy(tmp_str).data;
|
||||
Defer(free(lci_cstr));
|
||||
if(sscanf(lci_cstr, FMT_u64, &server->landing_channel_id) != 1){
|
||||
Return RESULT_ERROR("can't parse 'landing_channel_id' value as number", false);
|
||||
}
|
||||
// description
|
||||
try(str* v_desc, p, TomlTable_get_str(config_server, STR("description")));
|
||||
self->description = str_copy(*v_desc);
|
||||
|
||||
// parse local_address
|
||||
try_void(config_findValue(config_str, STR("local_address"), &tmp_str, true));
|
||||
char* local_end_cstr = str_copy(tmp_str).data;
|
||||
Defer(free(local_end_cstr));
|
||||
try_void(EndpointIPv4_parse(local_end_cstr, &server->local_end));
|
||||
// local_address
|
||||
try(str* v_local_address, p, TomlTable_get_str(config_server, STR("local_address")));
|
||||
try_assert(v_local_address->isZeroTerminated);
|
||||
try_void(EndpointIPv4_parse(v_local_address->data, &self->local_end));
|
||||
|
||||
// parse rsa_private_key
|
||||
try_void(config_findValue(config_str, STR("rsa_private_key"), &tmp_str, true));
|
||||
char* sk_base64_cstr = str_copy(tmp_str).data;
|
||||
Defer(free(sk_base64_cstr));
|
||||
// landing_channel_id
|
||||
try(i64 v_landing_channel_id, i, TomlTable_get_integer(config_server, STR("landing_channel_id")));
|
||||
self->landing_channel_id = v_landing_channel_id;
|
||||
|
||||
// parse rsa_public_key
|
||||
try_void(config_findValue(config_str, STR("rsa_public_key"), &tmp_str, true));
|
||||
char* pk_base64_cstr = str_copy(tmp_str).data;
|
||||
Defer(free(pk_base64_cstr));
|
||||
// [keys]
|
||||
try(TomlTable* config_keys, p, TomlTable_get_table(config_top, STR("keys")))
|
||||
// rsa_private_key
|
||||
try(str* v_rsa_sk, p, TomlTable_get_str(config_keys, STR("rsa_private_key")));
|
||||
try_assert(v_rsa_sk->isZeroTerminated);
|
||||
try_void(RSA_parsePrivateKey_base64(v_rsa_sk->data, &self->rsa_sk));
|
||||
|
||||
try_void(ServerCredentials_tryConstruct(&server->cred, sk_base64_cstr, pk_base64_cstr));
|
||||
// rsa_public_key
|
||||
try(str* v_rsa_pk, p, TomlTable_get_str(config_keys, STR("rsa_public_key")));
|
||||
try_assert(v_rsa_pk->isZeroTerminated);
|
||||
try_void(RSA_parsePublicKey_base64(v_rsa_pk->data, &self->rsa_pk));
|
||||
|
||||
// parse db_key
|
||||
try_void(config_findValue(config_str, STR("db_aes_key"), &tmp_str, true));
|
||||
Array(u8) db_aes_key = Array_alloc_size(base64_decodedSize(tmp_str.data, tmp_str.size));
|
||||
base64_decode(tmp_str.data, tmp_str.size, db_aes_key.data);
|
||||
// [db]
|
||||
try(TomlTable* config_db, p, TomlTable_get_table(config_top, STR("database")))
|
||||
// path
|
||||
try(str* v_db_path, p, TomlTable_get_str(config_db, STR("path")));
|
||||
self->db_path = str_copy(*v_db_path).data;
|
||||
|
||||
// parse db_dir and open db
|
||||
try_void(config_findValue(config_str, STR("db_dir"), &tmp_str, true));
|
||||
try(server->db, p, idb_open(tmp_str, db_aes_key));
|
||||
// open DB
|
||||
logInfo("loading database '%s'", self->db_path);
|
||||
try(self->db, p, ServerDatabase_open(self->db_path));
|
||||
try(self->queries, p, ServerQueries_compile(self->db));
|
||||
|
||||
// build users cache
|
||||
pthread_mutex_init(&server->users_cache_mutex, NULL);
|
||||
try(server->db_users_table, p, idb_getOrCreateTable(server->db, STR("users"), sizeof(User)));
|
||||
try(u64 users_count, u, idb_getRowCount(server->db_users_table));
|
||||
server->users_cache_list = List_alloc(User, users_count);
|
||||
HashMap_construct(&server->users_name_id_map, u64, NULL);
|
||||
// load whole table to list
|
||||
try_void(idb_getRows(server->db_users_table, 0, server->users_cache_list.data, users_count));
|
||||
// build name-id map
|
||||
for(u64 id; id < users_count; id++){
|
||||
User* u = &List_index(server->users_cache_list, User, id);
|
||||
str key = str_construct(u->name, u->name_len, true);
|
||||
if(!HashMap_tryPush(&server->users_name_id_map, key, &id)){
|
||||
Return RESULT_ERROR_FMT("duplicate user name '%s'", u->name);
|
||||
}
|
||||
// [channels]
|
||||
logDebug("loading channels...");
|
||||
try(TomlTable* config_channels, p, TomlTable_get_table(config_top, STR("channels")));
|
||||
HashMapIter channels_iter = HashMapIter_create(config_channels);
|
||||
while(HashMapIter_moveNext(&channels_iter)){
|
||||
HashMapKeyValue kv;
|
||||
HashMapIter_getCurrent(&channels_iter, &kv);
|
||||
str name = kv.key;
|
||||
TomlValue* val = kv.value_ptr;
|
||||
// skip if not table
|
||||
if(val->type != TLIBTOML_TABLE)
|
||||
continue;
|
||||
|
||||
logInfo("loading channel '"FMT_str"'", str_unwrap(name))
|
||||
TomlTable* config_channel = val->table;
|
||||
try(i64 id, u, TomlTable_get_integer(config_channel, STR("id")));
|
||||
try(str* v_ch_desc, p, TomlTable_get_str(config_channel, STR("description")))
|
||||
str description = *v_ch_desc;
|
||||
|
||||
try_void(Channel_createOrUpdate(self->queries, id, name, description));
|
||||
}
|
||||
|
||||
success = true;
|
||||
Return RESULT_VALUE(p, server);
|
||||
Return RESULT_VALUE(p, self);
|
||||
}
|
||||
|
||||
#undef LOGGER
|
||||
#undef LOG_FUNC
|
||||
#undef LOG_CONTEXT
|
||||
#define LOGGER server->logger
|
||||
#define LOG_FUNC server->log_func
|
||||
#define LOG_CONTEXT log_ctx
|
||||
|
||||
Result(void) Server_run(Server* server){
|
||||
Deferral(16);
|
||||
cstr log_ctx = "ListenerThread";
|
||||
logInfo(log_ctx, "starting server");
|
||||
logInfo("starting server");
|
||||
|
||||
logDebug(log_ctx, "initializing main socket");
|
||||
logDebug("initializing main socket");
|
||||
try(Socket main_socket, i, socket_open_TCP());
|
||||
try_void(socket_bind(main_socket, server->local_end));
|
||||
try_void(socket_listen(main_socket, 512));
|
||||
str local_end_str = EndpointIPv4_toStr(server->local_end);
|
||||
Defer(free(local_end_str.data));
|
||||
logInfo(log_ctx, "server is listening at %s", local_end_str.data);
|
||||
logInfo("server is listening at %s", local_end_str.data);
|
||||
|
||||
u64 session_id = 1;
|
||||
i64 session_id = 1;
|
||||
while(true){
|
||||
ConnectionHandlerArgs* args = (ConnectionHandlerArgs*)malloc(sizeof(ConnectionHandlerArgs));
|
||||
args->server = server;
|
||||
@@ -140,31 +153,42 @@ Result(void) Server_run(Server* server){
|
||||
|
||||
static void* handleConnection(void* _args){
|
||||
ConnectionHandlerArgs* args = (ConnectionHandlerArgs*)_args;
|
||||
Server* server = args->server;
|
||||
char log_ctx[64];
|
||||
sprintf(log_ctx, "Session-"FMT_x64, args->session_id);
|
||||
|
||||
ResultVar(void) r = try_handleConnection(args, log_ctx);
|
||||
if(r.error){
|
||||
str error_s = Error_toStr(r.error);
|
||||
logError(log_ctx, "%s", error_s.data);
|
||||
free(error_s.data);
|
||||
Error_addCallPos(r.error, ErrorCallPos_here());
|
||||
str e_str = Error_toStr(r.error);
|
||||
LogSeverity severity = LogSeverity_Error;
|
||||
|
||||
if(r.error->error_code_page == ErrorCodePage_TcpChat){
|
||||
if(r.error->error_code == TcpChatError_RejectIncoming){
|
||||
severity = LogSeverity_Debug;
|
||||
}
|
||||
}
|
||||
|
||||
log(severity, FMT_str, e_str.len, e_str.data);
|
||||
str_destroy(e_str);
|
||||
Error_free(r.error);
|
||||
}
|
||||
|
||||
logInfo("session end");
|
||||
free(args);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static Result(void) try_handleConnection(ConnectionHandlerArgs* args, cstr log_ctx){
|
||||
Deferral(16);
|
||||
Defer(free(args));
|
||||
|
||||
Server* server = args->server;
|
||||
logInfo("a client is trying to connect");
|
||||
ClientConnection* conn = NULL;
|
||||
Defer(
|
||||
ClientConnection_close(conn);
|
||||
logInfo(log_ctx, "session closed");
|
||||
);
|
||||
// establish encrypted connection
|
||||
try(conn, p, ClientConnection_accept(args));
|
||||
logInfo(log_ctx, "session accepted");
|
||||
Defer(ClientConnection_close(conn));
|
||||
logInfo("session accepted");
|
||||
|
||||
// handle requests
|
||||
PacketHeader req_head;
|
||||
@@ -179,7 +203,8 @@ static Result(void) try_handleConnection(ConnectionHandlerArgs* args, cstr log_c
|
||||
switch(req_head.type){
|
||||
// send error message and close connection
|
||||
default:
|
||||
try_void(sendErrorMessage_f(log_ctx, false, conn, &res_head,
|
||||
try_void(sendErrorMessage_f(log_ctx, conn, &res_head,
|
||||
LogSeverity_Error,
|
||||
"Received unexpected packet of type %u",
|
||||
req_head.type));
|
||||
Return RESULT_VOID;
|
||||
@@ -188,7 +213,10 @@ static Result(void) try_handleConnection(ConnectionHandlerArgs* args, cstr log_c
|
||||
case_handleRequest(ServerPublicInfo);
|
||||
case_handleRequest(Login);
|
||||
case_handleRequest(Register);
|
||||
|
||||
// authorized requests
|
||||
case_handleRequest(SendMessage);
|
||||
case_handleRequest(GetMessageBlock);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -1,60 +0,0 @@
|
||||
#pragma once
|
||||
#include "cryptography/AES.h"
|
||||
#include "cryptography/RSA.h"
|
||||
#include "network/encrypted_sockets.h"
|
||||
#include "db/idb.h"
|
||||
#include "tlibc/collections/HashMap.h"
|
||||
#include "tlibc/collections/List.h"
|
||||
#include "db_tables.h"
|
||||
#include <pthread.h>
|
||||
|
||||
typedef struct Server Server;
|
||||
|
||||
typedef struct ServerCredentials {
|
||||
br_rsa_private_key rsa_sk;
|
||||
br_rsa_public_key rsa_pk;
|
||||
} ServerCredentials;
|
||||
|
||||
Result(void) ServerCredentials_tryConstruct(ServerCredentials* cred,
|
||||
cstr rsa_sk_base64, cstr rsa_pk_base64);
|
||||
|
||||
void ServerCredentials_destroy(ServerCredentials* cred);
|
||||
|
||||
|
||||
typedef struct ClientConnection {
|
||||
u64 session_id;
|
||||
EndpointIPv4 client_end;
|
||||
Array(u8) session_key;
|
||||
EncryptedSocketTCP sock;
|
||||
bool authorized;
|
||||
} ClientConnection;
|
||||
|
||||
|
||||
typedef struct ConnectionHandlerArgs {
|
||||
Server* server;
|
||||
Socket accepted_socket_tcp;
|
||||
EndpointIPv4 client_end;
|
||||
u64 session_id;
|
||||
} ConnectionHandlerArgs;
|
||||
|
||||
Result(ClientConnection*) ClientConnection_accept(ConnectionHandlerArgs* args);
|
||||
|
||||
void ClientConnection_close(ClientConnection* conn);
|
||||
|
||||
|
||||
typedef struct Server {
|
||||
str name;
|
||||
str description;
|
||||
u64 landing_channel_id;
|
||||
EndpointIPv4 local_end;
|
||||
ServerCredentials cred;
|
||||
IncrementalDB* db;
|
||||
Table* db_users_table;
|
||||
pthread_mutex_t users_cache_mutex;
|
||||
List(User) users_cache_list; // index is id
|
||||
HashMap(u64) users_name_id_map; //key is user name
|
||||
} Server;
|
||||
|
||||
Result(Server*) Server_createFromConfig(cstr config_path);
|
||||
void Server_free(Server* server);
|
||||
Result(void) Server_run(Server* server);
|
||||
60
src/server/server_internal.h
Normal file
60
src/server/server_internal.h
Normal file
@@ -0,0 +1,60 @@
|
||||
#pragma once
|
||||
#include "tcp-chat.h"
|
||||
#include "cryptography/AES.h"
|
||||
#include "cryptography/RSA.h"
|
||||
#include "network/encrypted_sockets.h"
|
||||
#include "network/tcp-chat-protocol/v1.h"
|
||||
#include "db/server_db.h"
|
||||
|
||||
typedef struct ClientConnection ClientConnection;
|
||||
|
||||
typedef struct Server {
|
||||
/* from constructor */
|
||||
void* logger;
|
||||
LogFunction_t log_func;
|
||||
|
||||
/* from config */
|
||||
str name;
|
||||
str description;
|
||||
i64 landing_channel_id;
|
||||
EndpointIPv4 local_end;
|
||||
br_rsa_private_key rsa_sk;
|
||||
br_rsa_public_key rsa_pk;
|
||||
|
||||
/* database and cache*/
|
||||
char* db_path;
|
||||
tsqlite_connection* db;
|
||||
ServerQueries* queries; /* for server listener thread only */
|
||||
} Server;
|
||||
|
||||
|
||||
typedef struct ClientConnection {
|
||||
Server* server;
|
||||
i64 session_id;
|
||||
EndpointIPv4 client_end;
|
||||
Array(u8) session_key;
|
||||
EncryptedSocketTCP sock;
|
||||
bool authorized;
|
||||
i64 user_id; // 0 for unauthorized
|
||||
|
||||
/* buffers */
|
||||
MessageBlock message_block; // requested message block
|
||||
Array(u8) message_content; // sent message
|
||||
|
||||
/* database */
|
||||
tsqlite_connection* db;
|
||||
ServerQueries* queries;
|
||||
} ClientConnection;
|
||||
|
||||
typedef struct ConnectionHandlerArgs {
|
||||
Server* server;
|
||||
Socket accepted_socket_tcp;
|
||||
EndpointIPv4 client_end;
|
||||
i64 session_id;
|
||||
} ConnectionHandlerArgs;
|
||||
|
||||
Result(ClientConnection*) ClientConnection_accept(ConnectionHandlerArgs* args);
|
||||
|
||||
void ClientConnection_close(ClientConnection* conn);
|
||||
|
||||
|
||||
16
src/network/network.c → src/tcp-chat.c
Executable file → Normal file
16
src/network/network.c → src/tcp-chat.c
Executable file → Normal file
@@ -1,21 +1,27 @@
|
||||
#include "internal.h"
|
||||
#include "network/internal.h"
|
||||
|
||||
ErrorCodePage_define(WINSOCK2);
|
||||
ErrorCodePage_define(TcpChat);
|
||||
|
||||
Result(void) TcpChat_init(){
|
||||
Deferral(4);
|
||||
|
||||
ErrorCodePage_register(TcpChat);
|
||||
|
||||
Result(void) network_init(){
|
||||
#if _WIN32
|
||||
ErrorCodePage_register(WINSOCK2);
|
||||
|
||||
// Initialize Winsock
|
||||
WSADATA wsaData = {0};
|
||||
int result = WSAStartup(MAKEWORD(2,2), &wsaData);
|
||||
if (result != 0) {
|
||||
return RESULT_ERROR_FMT("WSAStartup failed with error code 0x%X", result);
|
||||
Return RESULT_ERROR_CODE_FMT(WINSOCK2, result, "WSAStartup failed with error code %i", result);
|
||||
}
|
||||
#endif
|
||||
return RESULT_VOID;
|
||||
Return RESULT_VOID;
|
||||
}
|
||||
|
||||
void network_deinit(){
|
||||
void TcpChat_deinit(){
|
||||
#if _WIN32
|
||||
// Deinitialize Winsock
|
||||
(void)WSACleanup();
|
||||
95
src/term.c
95
src/term.c
@@ -1,95 +0,0 @@
|
||||
#include "term.h"
|
||||
#include <unistd.h>
|
||||
#include IFWIN("windows.h", "sys/ioctl.h")
|
||||
|
||||
bool term_init(){
|
||||
#if defined(_WIN64) || defined(_WIN32)
|
||||
DWORD mode=0;
|
||||
HANDLE h;
|
||||
|
||||
// configure stdout
|
||||
h = GetStdHandle(STD_OUTPUT_HANDLE);
|
||||
if(h == INVALID_HANDLE_VALUE)
|
||||
return false;
|
||||
GetConsoleMode(h, &mode);
|
||||
mode |= ENABLE_VIRTUAL_TERMINAL_PROCESSING;
|
||||
mode |= ENABLE_PROCESSED_OUTPUT;
|
||||
SetConsoleMode(h, mode);
|
||||
|
||||
// configure stdin
|
||||
h = GetStdHandle(STD_INPUT_HANDLE);
|
||||
if(h == INVALID_HANDLE_VALUE)
|
||||
return false;
|
||||
GetConsoleMode(h, &mode);
|
||||
mode |= ENABLE_VIRTUAL_TERMINAL_INPUT;
|
||||
mode |= ENABLE_PROCESSED_INPUT;
|
||||
SetConsoleMode(h, mode);
|
||||
#endif
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
int getenv_int(const char* var_name){
|
||||
char* str=getenv(var_name);
|
||||
if(str==NULL)
|
||||
return -1;
|
||||
return strtol(str, NULL, 0);
|
||||
}
|
||||
|
||||
bool term_getSize(TerminalSize* out) {
|
||||
#if defined(_WIN64) || defined(_WIN32)
|
||||
// helps when STD_OUT is redirected to a file
|
||||
HANDLE hConsoleErr = GetStdHandle(STD_ERROR_HANDLE);
|
||||
CONSOLE_SCREEN_BUFFER_INFO consoleInfo;
|
||||
if(!GetConsoleScreenBufferInfo(hConsoleErr, &consoleInfo))
|
||||
return false;
|
||||
|
||||
out->cols = consoleInfo.srWindow.Right - consoleInfo.srWindow.Left + 1;
|
||||
out->rows = consoleInfo.srWindow.Bottom - consoleInfo.srWindow.Top + 1;
|
||||
#else
|
||||
struct winsize ws = {0};
|
||||
// try to get terminal size from stdin, stdout, stderr
|
||||
if (ioctl(STDIN_FILENO, TIOCGWINSZ, &ws)==0 ||
|
||||
ioctl(STDOUT_FILENO, TIOCGWINSZ, &ws)==0 ||
|
||||
ioctl(STDERR_FILENO, TIOCGWINSZ, &ws)==0 ){
|
||||
out->cols=ws.ws_col;
|
||||
out->rows=ws.ws_row;
|
||||
}
|
||||
// try to get size from environtent variables
|
||||
else {
|
||||
out->cols=getenv_int("COLUMNS");
|
||||
out->rows=getenv_int("LINES");
|
||||
}
|
||||
#endif
|
||||
|
||||
return out->cols > 0 && out->rows > 0;
|
||||
}
|
||||
|
||||
/*
|
||||
Most of escape sequences can be found there
|
||||
https://gist.github.com/fnky/458719343aabd01cfb17a3a4f7296797
|
||||
*/
|
||||
|
||||
void term_resetCursor() {
|
||||
printf("\e[H");
|
||||
}
|
||||
|
||||
void term_resetColors() {
|
||||
printf("\e[0m");
|
||||
}
|
||||
|
||||
void term_clear() {
|
||||
printf("\e[0m\e[H\e[2J");
|
||||
}
|
||||
|
||||
void term_cursorMove(u16 row, u16 column) {
|
||||
printf("\e[%u;%uH",row,column);
|
||||
}
|
||||
|
||||
void term_cursorHide() {
|
||||
printf("\e[?25l");
|
||||
}
|
||||
|
||||
void term_cursorShow() {
|
||||
printf("\e[?25h");
|
||||
}
|
||||
16
src/term.h
16
src/term.h
@@ -1,16 +0,0 @@
|
||||
#pragma once
|
||||
#include "tlibc/std.h"
|
||||
|
||||
typedef struct TerminalSize {
|
||||
i16 cols;
|
||||
i16 rows;
|
||||
} TerminalSize;
|
||||
|
||||
bool term_init();
|
||||
bool term_getSize(TerminalSize* out);
|
||||
void term_resetCursor();
|
||||
void term_resetColors();
|
||||
void term_clear();
|
||||
void term_cursorMove(u16 row, u16 column);
|
||||
void term_cursorHide();
|
||||
void term_cursorShow();
|
||||
22
tcp-chat-server.toml.default
Normal file
22
tcp-chat-server.toml.default
Normal file
@@ -0,0 +1,22 @@
|
||||
[server]
|
||||
name = "Test Server"
|
||||
description = """\
|
||||
Lorem ipsum labuba aboba.\n\
|
||||
Qqqqq...\
|
||||
"""
|
||||
local_address = '127.0.0.1:9988'
|
||||
landing_channel_id = 1
|
||||
|
||||
# do not create channels with the same id
|
||||
[channels.general]
|
||||
id = 1
|
||||
description = "a text channel"
|
||||
|
||||
[database]
|
||||
path = 'tcp-chat-server/server.sqlite'
|
||||
# on windows use backslashes
|
||||
# path = 'tcp-chat-server\server.sqlite'
|
||||
|
||||
[keys]
|
||||
rsa_private_key = '<generate with './tcp-chat --rsa-gen-random'>'
|
||||
rsa_public_key = '<copy from output of command above>'
|
||||
Reference in New Issue
Block a user