Compare commits

...

10 Commits

Author SHA1 Message Date
06d835e2b9
implemented encrypt_decrypt_message in send/receive fns
Some checks failed
Codacy Scan / Codacy Security Scan (push) Successful in 21s
Build WHY2-chat / test-why2 (./out/why2-chat-client, ./configure.sh, ubuntu-latest, ./out/why2-chat-server) (push) Failing after 1m33s
Test WHY2-core / test-why2 (why2, ./configure.sh, gdb -ex "run" -ex "quit" --batch, ubuntu-latest, ./out/why2-core-test, valgrind --leak-check=full --show-leak-kinds=reachable --track-origins=yes -s) (push) Failing after 1m52s
Test WHY2-logger / test-why2 (why2-logger, ./configure.sh, gdb -ex "run" -ex "quit" --batch, ubuntu-latest, ./out/why2-logger-test, valgrind --leak-check=full --show-leak-kinds=reachable --track-origins=yes -s) (push) Failing after 1m51s
Test Project / test-project (./configure.sh, gdb -ex "run" -ex "quit" --batch, ubuntu-latest, ./test) (push) Failing after 1m53s
2025-02-02 15:48:18 +01:00
6e67e6225f
fixed encrypt_decrypt_message base64 problems 2025-02-02 15:47:40 +01:00
ee104f3208
created encrypt_decrypt_message fn
with ENCRYPTION_DECRYPTION enum
2025-02-02 15:16:17 +01:00
5cbb9375dd
implicit declaration of base64_decode fix 2025-02-02 15:15:08 +01:00
2649709c41
added length to why2_output_flags 2025-02-02 15:11:56 +01:00
4c7100760b
changed base64_encode length to size_t* 2025-02-02 15:01:20 +01:00
0a9a716ffe
moved base64 fns to crypto header 2025-02-02 14:59:52 +01:00
06b1c8728c
deallocating CS key on client exit 2025-02-02 14:29:14 +01:00
cdbbdce47c
fixed invalid read on double json in buffer 2025-02-02 14:28:08 +01:00
90be3ebc21
passing key to send/receive functions 2025-02-02 00:02:56 +01:00
9 changed files with 236 additions and 142 deletions

View File

@ -43,6 +43,9 @@ extern "C" {
void why2_chat_init_keys(void); //INIT (POSSIBLY GENERATE) ECC KEYS void why2_chat_init_keys(void); //INIT (POSSIBLY GENERATE) ECC KEYS
void why2_chat_deallocate_keys(void); //DEALLOCATE :) (NO SLUR HERE) void why2_chat_deallocate_keys(void); //DEALLOCATE :) (NO SLUR HERE)
char *why2_chat_base64_encode(char *message, size_t *length); //ENCODE message OF length INTO BASE64 WITH LENGTH DELIMITER (WHY2_CHAT_BASE64_LENGTH_DELIMITER)
char *why2_chat_base64_decode(char *encoded_message, size_t *length); //DECODE encoded_message AND SET length TO OUTPUT LENGTH
char *why2_chat_ecc_sign(char *message); //SIGN message WITH ECC KEY char *why2_chat_ecc_sign(char *message); //SIGN message WITH ECC KEY
why2_bool why2_chat_ecc_verify_signature(char *message, char *signature, EVP_PKEY *key); why2_bool why2_chat_ecc_verify_signature(char *message, char *signature, EVP_PKEY *key);

View File

@ -35,8 +35,8 @@ typedef struct
} __why2_accept_thread_params; } __why2_accept_thread_params;
//FUNCTIONS //FUNCTIONS
void why2_send_socket(char *text, char *username, int socket); //send socket.... wtf did you expect void why2_send_socket(char *text, char *username, char *key, int socket); //send socket.... wtf did you expect
void why2_send_socket_code(char *params, char *username, int socket, char *code); //SEND SOCKET BUT WITH CODE void why2_send_socket_code(char *params, char *username, char *key, int socket, char *code); //SEND SOCKET BUT WITH CODE
void *why2_communicate_thread(void *arg); //COMMUNICATION THREAD void *why2_communicate_thread(void *arg); //COMMUNICATION THREAD
void *why2_authority_communicate_thread(void *arg); //CA COMMUNICATION THREAD void *why2_authority_communicate_thread(void *arg); //CA COMMUNICATION THREAD
void *why2_accept_thread(void *params); //LOOP ACCEPTING CONNECTIONS void *why2_accept_thread(void *params); //LOOP ACCEPTING CONNECTIONS

View File

@ -87,6 +87,7 @@ typedef struct
typedef struct typedef struct
{ {
char *output_text; //VARIABLE FOR ENCRYPTED/DECRYPTED TEXT char *output_text; //VARIABLE FOR ENCRYPTED/DECRYPTED TEXT
unsigned long output_text_length; //LENGTH OF ENCRYPTED/DECRYPTED TEXT
char *used_key; //VARIABLE FOR USED/GENERATED KEY char *used_key; //VARIABLE FOR USED/GENERATED KEY
unsigned long unused_key_size; //VARIABLE FOR COUNT OF WHY2_UNUSED CHARACTERS IN KEY unsigned long unused_key_size; //VARIABLE FOR COUNT OF WHY2_UNUSED CHARACTERS IN KEY
unsigned long repeated_key_size; //VARIABLE FOR COUNT OF REPEATED CHARACTERS IN KEY (basically reversed unused_key_size) unsigned long repeated_key_size; //VARIABLE FOR COUNT OF REPEATED CHARACTERS IN KEY (basically reversed unused_key_size)

View File

@ -36,68 +36,6 @@ along with this program. If not, see <https://www.gnu.org/licenses/>.
EVP_PKEY *keypair = NULL; //KEYPAIR EVP_PKEY *keypair = NULL; //KEYPAIR
//LOCAL //LOCAL
char *base64_encode(char *message, size_t length)
{
//VARIABLES
BIO *bio;
BIO *b64;
BUF_MEM *buffer_ptr;
char* encoded_message;
//INIT BIOs
b64 = BIO_new(BIO_f_base64());
BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL); //DISABLE NEWLINES
bio = BIO_new(BIO_s_mem());
bio = BIO_push(b64, bio);
//ENCODE
BIO_write(bio, message, length);
BIO_flush(bio);
BIO_get_mem_ptr(bio, &buffer_ptr);
//COPY
encoded_message = why2_malloc(buffer_ptr -> length + why2_count_int_length((int) length) + 2);
memcpy(encoded_message, buffer_ptr -> data, buffer_ptr -> length);
sprintf(encoded_message + buffer_ptr -> length, "%c%zu%c", WHY2_CHAT_BASE64_LENGTH_DELIMITER, length, '\0'); //APPEND LENGTH
//DEALLOCATION
BIO_free_all(bio);
return encoded_message;
}
char *base64_decode(char *encoded_message, size_t *length)
{
//VARIABLES
BIO *bio;
BIO *b64;
char *separator_ptr = strrchr(encoded_message, WHY2_CHAT_BASE64_LENGTH_DELIMITER); //GET THE DELIMITER POINTER
size_t length_local = strtoull(separator_ptr + 1, NULL, 10);
char* decoded_message = why2_malloc(length_local + 1);
int decoded_length;
//INIT BIOs
b64 = BIO_new(BIO_f_base64());
BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL); //DISABLE NEWLINES
bio = BIO_new_mem_buf(encoded_message, separator_ptr - encoded_message);
bio = BIO_push(b64, bio);
//DECODE
decoded_length = BIO_read(bio, decoded_message, length_local);
//NULL-TERM
decoded_message[decoded_length] = '\0';
//DEALLOCATION
BIO_free_all(bio);
//SET length
if (length != NULL) *length = length_local;
return decoded_message;
}
void calculate_ecdh_secret(EVP_PKEY *pri, EVP_PKEY *pub, char **secret, size_t *len) void calculate_ecdh_secret(EVP_PKEY *pri, EVP_PKEY *pub, char **secret, size_t *len)
{ {
EVP_PKEY_CTX *ctx = EVP_PKEY_CTX_new(pri, NULL); EVP_PKEY_CTX *ctx = EVP_PKEY_CTX_new(pri, NULL);
@ -158,6 +96,68 @@ void why2_chat_init_keys(void)
why2_deallocate(key); why2_deallocate(key);
} }
char *why2_chat_base64_encode(char *message, size_t *length)
{
//VARIABLES
BIO *bio;
BIO *b64;
BUF_MEM *buffer_ptr;
char* encoded_message;
//INIT BIOs
b64 = BIO_new(BIO_f_base64());
BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL); //DISABLE NEWLINES
bio = BIO_new(BIO_s_mem());
bio = BIO_push(b64, bio);
//ENCODE
BIO_write(bio, message, *length);
BIO_flush(bio);
BIO_get_mem_ptr(bio, &buffer_ptr);
//COPY
encoded_message = why2_malloc(buffer_ptr -> length + why2_count_int_length((int) *length) + 2);
memcpy(encoded_message, buffer_ptr -> data, buffer_ptr -> length);
sprintf(encoded_message + buffer_ptr -> length, "%c%zu%c", WHY2_CHAT_BASE64_LENGTH_DELIMITER, *length, '\0'); //APPEND LENGTH
//DEALLOCATION
BIO_free_all(bio);
return encoded_message;
}
char *why2_chat_base64_decode(char *encoded_message, size_t *length)
{
//VARIABLES
BIO *bio;
BIO *b64;
char *separator_ptr = strrchr(encoded_message, WHY2_CHAT_BASE64_LENGTH_DELIMITER); //GET THE DELIMITER POINTER
size_t length_local = strtoull(separator_ptr + 1, NULL, 10);
char* decoded_message = why2_malloc(length_local + 1);
int decoded_length;
//INIT BIOs
b64 = BIO_new(BIO_f_base64());
BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL); //DISABLE NEWLINES
bio = BIO_new_mem_buf(encoded_message, separator_ptr - encoded_message);
bio = BIO_push(b64, bio);
//DECODE
decoded_length = BIO_read(bio, decoded_message, length_local);
//NULL-TERM
decoded_message[decoded_length] = '\0';
//DEALLOCATION
BIO_free_all(bio);
//SET length
if (length != NULL) *length = length_local;
return decoded_message;
}
char *why2_chat_ecc_sign(char *message) char *why2_chat_ecc_sign(char *message)
{ {
//VARIABLES //VARIABLES
@ -177,7 +177,7 @@ char *why2_chat_ecc_sign(char *message)
sig = why2_malloc(siglen); //ALLOCATE SIGNATURE sig = why2_malloc(siglen); //ALLOCATE SIGNATURE
EVP_DigestSignFinal(mdctx, (unsigned char*) sig, &siglen); EVP_DigestSignFinal(mdctx, (unsigned char*) sig, &siglen);
encoded_sig = base64_encode(sig, siglen); //CONVERT sig TO BASE64 encoded_sig = why2_chat_base64_encode(sig, &siglen); //CONVERT sig TO BASE64
//DEALLOCATION //DEALLOCATION
why2_deallocate(sig); why2_deallocate(sig);
@ -190,7 +190,7 @@ why2_bool why2_chat_ecc_verify_signature(char *message, char *signature, EVP_PKE
{ {
//VARIABLES //VARIABLES
size_t length; size_t length;
char *decoded_signature = base64_decode(signature, &length); //DECODE SIGNATURE char *decoded_signature = why2_chat_base64_decode(signature, &length); //DECODE SIGNATURE
why2_bool returning; why2_bool returning;
//INIT CONTEXT //INIT CONTEXT
@ -232,7 +232,7 @@ char *why2_chat_ecc_serialize_public_key()
pubkey[length] = '\0'; pubkey[length] = '\0';
//ENCODE //ENCODE
base64_encoded = base64_encode(pubkey, length); base64_encoded = why2_chat_base64_encode(pubkey, &length);
//DEALLOCATION //DEALLOCATION
BIO_free(bio); BIO_free(bio);
@ -247,7 +247,7 @@ EVP_PKEY* why2_chat_ecc_deserialize_public_key(char *pubkey)
//VARIABLES //VARIABLES
BIO *bio; BIO *bio;
EVP_PKEY *key; EVP_PKEY *key;
char *base64_decoded = base64_decode(pubkey, NULL); char *base64_decoded = why2_chat_base64_decode(pubkey, NULL);
//EXTRACT KEY //EXTRACT KEY
bio = BIO_new_mem_buf(base64_decoded, -1); bio = BIO_new_mem_buf(base64_decoded, -1);
@ -265,7 +265,7 @@ char *why2_chat_ecc_shared_key(char *ecc_key)
size_t key_length; size_t key_length;
char *secret = NULL; char *secret = NULL;
size_t secret_len; size_t secret_len;
char *recipient_pubkey_decoded = base64_decode(ecc_key, &key_length); //DECODE key char *recipient_pubkey_decoded = why2_chat_base64_decode(ecc_key, &key_length); //DECODE key
char *sym_key; char *sym_key;
BIO *bio = BIO_new_mem_buf(recipient_pubkey_decoded, -1); BIO *bio = BIO_new_mem_buf(recipient_pubkey_decoded, -1);
EVP_PKEY *recipient_pubkey = PEM_read_bio_PUBKEY(bio, NULL, NULL, NULL); EVP_PKEY *recipient_pubkey = PEM_read_bio_PUBKEY(bio, NULL, NULL, NULL);

View File

@ -44,7 +44,7 @@ void exit_client(WHY2_UNUSED int i) //guess what
if (exited) return; if (exited) return;
exited = 1; exited = 1;
why2_send_socket_code(NULL, NULL, listen_socket, WHY2_CHAT_CODE_EXIT); why2_send_socket_code(NULL, NULL, why2_chat_get_client_server_key(), listen_socket, WHY2_CHAT_CODE_EXIT);
} }
why2_bool command(char *input, char *command, char **arg) why2_bool command(char *input, char *command, char **arg)
@ -264,17 +264,17 @@ int main(void)
char *final_message = why2_malloc(strlen(id) + strlen(msg) + 2); char *final_message = why2_malloc(strlen(id) + strlen(msg) + 2);
sprintf(final_message, "%s;%s%c", id, msg, '\0'); sprintf(final_message, "%s;%s%c", id, msg, '\0');
why2_send_socket_code(final_message, NULL, listen_socket, WHY2_CHAT_CODE_DM); //SEND why2_send_socket_code(final_message, NULL, why2_chat_get_client_server_key(), listen_socket, WHY2_CHAT_CODE_DM); //SEND
//DEALLOCATION //DEALLOCATION
why2_deallocate(id); why2_deallocate(id);
why2_deallocate(final_message); why2_deallocate(final_message);
} else if (command(line, WHY2_CHAT_COMMAND_LIST, &cmd_arg)) //LIST CMD } else if (command(line, WHY2_CHAT_COMMAND_LIST, &cmd_arg)) //LIST CMD
{ {
why2_send_socket_code(NULL, NULL, listen_socket, WHY2_CHAT_CODE_LIST); why2_send_socket_code(NULL, NULL, why2_chat_get_client_server_key(), listen_socket, WHY2_CHAT_CODE_LIST);
} else if (command(line, WHY2_CHAT_COMMAND_VERSION, &cmd_arg)) //VERSION CMD } else if (command(line, WHY2_CHAT_COMMAND_VERSION, &cmd_arg)) //VERSION CMD
{ {
why2_send_socket_code(NULL, NULL, listen_socket, WHY2_CHAT_CODE_VERSION); why2_send_socket_code(NULL, NULL, why2_chat_get_client_server_key(), listen_socket, WHY2_CHAT_CODE_VERSION);
} else } else
{ {
invalid("command"); invalid("command");
@ -288,7 +288,7 @@ int main(void)
char *hash = why2_sha256(line, strlen(line)); //HASHISH char *hash = why2_sha256(line, strlen(line)); //HASHISH
why2_send_socket_code(hash, NULL, listen_socket, WHY2_CHAT_CODE_PASSWORD); //SEND BUT HASHED why2_send_socket_code(hash, NULL, why2_chat_get_client_server_key(), listen_socket, WHY2_CHAT_CODE_PASSWORD); //SEND BUT HASHED
//DEALLOCATION //DEALLOCATION
why2_deallocate(hash); why2_deallocate(hash);
@ -299,10 +299,10 @@ int main(void)
{ {
__why2_set_asking_username(0); __why2_set_asking_username(0);
why2_send_socket_code(line, NULL, listen_socket, WHY2_CHAT_CODE_USERNAME); why2_send_socket_code(line, NULL, why2_chat_get_client_server_key(), listen_socket, WHY2_CHAT_CODE_USERNAME);
} else } else
{ {
why2_send_socket(line, NULL, listen_socket); //NULL IS SENT BECAUSE IT IS USELESS TO SEND USER FROM CLIENT - SERVER WON'T USE IT why2_send_socket(line, NULL, why2_chat_get_client_server_key(), listen_socket); //NULL IS SENT BECAUSE IT IS USELESS TO SEND USER FROM CLIENT - SERVER WON'T USE IT
} }
} }
@ -319,6 +319,7 @@ int main(void)
why2_deallocate(cmd_arg); why2_deallocate(cmd_arg);
why2_chat_deallocate_keys(); //DEALLOCATE GETTERS FOR KEYS why2_chat_deallocate_keys(); //DEALLOCATE GETTERS FOR KEYS
why2_chat_deallocate_client_server_key();
why2_clean_memory(""); //RUN GARBAGE COLLECTOR why2_clean_memory(""); //RUN GARBAGE COLLECTOR

View File

@ -34,6 +34,8 @@ along with this program. If not, see <https://www.gnu.org/licenses/>.
#include <why2/chat/crypto.h> #include <why2/chat/crypto.h>
#include <why2/chat/flags.h> #include <why2/chat/flags.h>
#include <why2/encrypter.h>
#include <why2/decrypter.h>
#include <why2/llist.h> #include <why2/llist.h>
#include <why2/memory.h> #include <why2/memory.h>
#include <why2/misc.h> #include <why2/misc.h>
@ -50,6 +52,18 @@ typedef struct _connection_node
char *key; //EACH USER WILL USE DIFFERENT KEY FOR COMMUNICATION char *key; //EACH USER WILL USE DIFFERENT KEY FOR COMMUNICATION
} connection_node_t; //SINGLE LINKED LIST } connection_node_t; //SINGLE LINKED LIST
typedef struct _read_socket_raw_thread_node
{
int connection;
char *key;
} read_socket_raw_thread_node_t;
enum ENCRYPTION_DECRYPTION
{
ENCRYPTION,
DECRYPTION
};
why2_list_t connection_list = WHY2_LIST_EMPTY; why2_list_t connection_list = WHY2_LIST_EMPTY;
why2_list_t waiting_list = WHY2_LIST_EMPTY; why2_list_t waiting_list = WHY2_LIST_EMPTY;
@ -113,7 +127,7 @@ void send_to_all(char *json)
connection_buffer = *(connection_node_t*) node_buffer -> value; connection_buffer = *(connection_node_t*) node_buffer -> value;
why2_send_socket(message, username, connection_buffer.connection); //SEND TO CLIENT why2_send_socket(message, username, connection_buffer.key, connection_buffer.connection); //SEND TO CLIENT
} }
//DEALLOCATION //DEALLOCATION
@ -159,7 +173,62 @@ void remove_non_ascii(char **text)
(*text)[j] = '\0'; (*text)[j] = '\0';
} }
char *read_socket_raw(int socket) char *__fake_base64(char *text, WHY2_UNUSED size_t *length)
{
return why2_strdup(text);
}
void encrypt_decrypt_message(char **message, char *key, enum ENCRYPTION_DECRYPTION operation)
{
//NO ENCRYPTION
if (key == NULL) return;
//CALLBACKS
why2_output_flags (*operation_cb)(char*, char*) = NULL;
char *(*base64_before_cb)(char*, size_t*) = NULL;
char *(*base64_after_cb)(char*, size_t*) = NULL;
//SELECT CORRECT CALLBACK
switch (operation)
{
case ENCRYPTION:
operation_cb = why2_encrypt_text;
base64_before_cb = __fake_base64;
base64_after_cb = why2_chat_base64_encode;
break;
case DECRYPTION:
operation_cb = why2_decrypt_text;
base64_before_cb = why2_chat_base64_decode;
base64_after_cb = __fake_base64;
break;
default:
why2_die("ENCRYPTION_DECRYPTION not implemented!");
break;
}
//VARIABLES
size_t length = strlen(*message);
char *message_decoded = base64_before_cb(*message, &length);
//SET FLAGS
if (why2_get_key_length() < strlen(key)) why2_set_key_length(strlen(key));
why2_set_flags((why2_input_flags) { 1, 1, 0, WHY2_v4, WHY2_OUTPUT_TEXT, 0 }); //TODO: Add padding
//ENCRYPT
why2_output_flags output = operation_cb(message_decoded, key);
//COPY OUTPUT IN BASE64
why2_deallocate(*message);
*message = base64_after_cb(output.output_text, &output.output_text_length);
//DEALLOCATION
why2_deallocate(message_decoded);
why2_deallocate_output(output);
}
char *read_socket_raw(int socket, char *key)
{ {
if (socket == -1) if (socket == -1)
{ {
@ -168,31 +237,36 @@ char *read_socket_raw(int socket)
} }
char *content_buffer = NULL; char *content_buffer = NULL;
int content_size; size_t content_size = 0;
char *wait_buffer = why2_malloc(2); //TEMP char *wait_buffer = why2_malloc(2); //TEMP
//WAIT TILl RECEIVED MSG (ik it sucks but i can't think of better solution; anyways, this is way more convenient than infinite loop that makes my computer go wroom wroom) //WAIT TILl RECEIVED MSG (ik it sucks but i can't think of better solution; anyways, this is way more convenient than infinite loop that makes my computer go wroom wroom)
recv(socket, wait_buffer, 1, MSG_PEEK); recv(socket, wait_buffer, 1, MSG_PEEK);
why2_deallocate(wait_buffer); why2_deallocate(wait_buffer);
do //FIND THE RECEIVED SIZE
{ ioctl(socket, FIONREAD, &content_size);
//FIND THE SENT SIZE
content_size = 0;
if (ioctl(socket, FIONREAD, &content_size) < 0 || content_size <= 0) continue;
//ALLOCATE //ALLOCATE
content_buffer = why2_realloc(content_buffer, content_size + 1); content_buffer = why2_malloc(content_size + 1);
for (size_t i = 0; i < content_size; i++)
{
//END OF MESSAGE REACHED (COULD BE CAUSED BY FAST SENT MESSAGES)
if (i >= 2 && strncmp(content_buffer + i - 2, "\"}", 2) == 0) break;
//READ JSON MESSAGE //READ JSON MESSAGE
if (recv(socket, content_buffer, content_size, 0) != content_size) //READ THE MESSAGE BY CHARACTERS if (recv(socket, content_buffer + i, 1, 0) != 1) //READ THE MESSAGE BY CHARACTERS
{ {
fprintf(stderr, "Socket probably read wrongly!\n"); fprintf(stderr, "Socket probably read wrongly!\n");
break;
}
} }
} while (content_buffer == NULL || strncmp(content_buffer + (content_size - 2), "\"}", 2) != 0);
content_buffer[content_size] = '\0'; //NULL TERM content_buffer[content_size] = '\0'; //NULL TERM
encrypt_decrypt_message(&content_buffer, key, DECRYPTION); //DECRYPT
//VALIDATE JSON FORMAT //VALIDATE JSON FORMAT
struct json_object *json = json_tokener_parse(content_buffer); struct json_object *json = json_tokener_parse(content_buffer);
if (json == NULL) if (json == NULL)
@ -211,7 +285,9 @@ char *read_socket_raw(int socket)
void *read_socket_raw_thread(void *socket) void *read_socket_raw_thread(void *socket)
{ {
return read_socket_raw(*(int*) socket); read_socket_raw_thread_node_t node = *(read_socket_raw_thread_node_t*) socket;
return read_socket_raw(node.connection, node.key);
} }
void remove_json_syntax_characters(char *text) void remove_json_syntax_characters(char *text)
@ -346,20 +422,23 @@ why2_node_t *find_connection_by_id(unsigned long id)
return buffer; return buffer;
} }
char *read_user(int connection, void **raw_ptr) char *read_user(int connection, void **raw_ptr, char *key)
{ {
//VARIABLES //VARIABLES
void *buffer; void *buffer;
pthread_t thread_buffer; pthread_t thread_buffer;
pthread_t thread_deletion_buffer; pthread_t thread_deletion_buffer;
//PARSE PARAMETERS
read_socket_raw_thread_node_t node = { connection, key };
//RESET VARIABLES //RESET VARIABLES
*raw_ptr = NULL; *raw_ptr = NULL;
buffer = &thread_buffer; buffer = &thread_buffer;
//READ //READ
pthread_create(&thread_buffer, NULL, read_socket_raw_thread, &connection); pthread_create(&thread_buffer, NULL, read_socket_raw_thread, &node);
why2_list_push(&waiting_list, &buffer, sizeof(buffer)); why2_list_push(&waiting_list, &buffer, sizeof(buffer));
//RUN DELETION THREAD //RUN DELETION THREAD
@ -383,21 +462,21 @@ char *get_username(int connection)
return c_node.username; return c_node.username;
} }
void send_socket_deallocate(char *text, char *username, int socket) //SAME AS why2_send_socket BUT IT DEALLOCATES username void send_socket_deallocate(char *text, char *username, char *key, int socket) //SAME AS why2_send_socket BUT IT DEALLOCATES username
{ {
why2_send_socket(text, username, socket); why2_send_socket(text, username, key, socket);
why2_toml_read_free(username); why2_toml_read_free(username);
} }
void send_socket_code_deallocate(char *params, char *username, int socket, char *code) //SAME AS send_socket_deallocate BUT WITH CODE FIELD void send_socket_code_deallocate(char *params, char *username, char *key, int socket, char *code) //SAME AS send_socket_deallocate BUT WITH CODE FIELD
{ {
why2_send_socket_code(params, username, socket, code); why2_send_socket_code(params, username, key, socket, code);
why2_toml_read_free(username); why2_toml_read_free(username);
} }
void send_socket(char *text, char *username, int socket, why2_bool welcome, char *code) void send_socket(char *text, char *username, char *why2_key, int socket, why2_bool welcome, char *code)
{ {
//VARIABLES //VARIABLES
char *output = why2_strdup(""); char *output = why2_strdup("");
@ -457,6 +536,8 @@ void send_socket(char *text, char *username, int socket, why2_bool welcome, char
} }
add_brackets(&output); add_brackets(&output);
encrypt_decrypt_message(&output, why2_key, ENCRYPTION); //ENCRYPT
//SEND //SEND
send(socket, output, strlen(output), 0); send(socket, output, strlen(output), 0);
@ -465,16 +546,16 @@ void send_socket(char *text, char *username, int socket, why2_bool welcome, char
why2_deallocate(output); why2_deallocate(output);
} }
void send_welcome_socket_deallocate(char *text, char *username, int socket) //SAME AS why2_send_socket BUT IT DEALLOCATES username void send_welcome_socket_deallocate(char *text, char *username, char *key, int socket) //SAME AS why2_send_socket BUT IT DEALLOCATES username
{ {
send_socket(NULL, username, socket, 1, text); send_socket(NULL, username, key, socket, 1, text);
why2_toml_read_free(username); why2_toml_read_free(username);
} }
void send_welcome_packet(int connection) void send_welcome_packet(int connection, char *key)
{ {
send_welcome_socket_deallocate(WHY2_CHAT_CODE_ACCEPT_MESSAGES, why2_chat_server_config("server_username"), connection); send_welcome_socket_deallocate(WHY2_CHAT_CODE_ACCEPT_MESSAGES, why2_chat_server_config("server_username"), key, connection);
} }
unsigned long get_latest_id() unsigned long get_latest_id()
@ -509,7 +590,7 @@ why2_bool perform_key_exchange_client(int connection)
char *read_code = NULL; char *read_code = NULL;
why2_bool exiting_read = 0; why2_bool exiting_read = 0;
why2_send_socket_code(client_pubkey, NULL, connection, WHY2_CHAT_CODE_CLIENT_SERVER_KEY_EXCHANGE); //SEND pubkey TO SERVER why2_send_socket_code(client_pubkey, NULL, NULL, connection, WHY2_CHAT_CODE_CLIENT_SERVER_KEY_EXCHANGE); //SEND pubkey TO SERVER
why2_deallocate(client_pubkey); //DEALLOCATE client_pubkey why2_deallocate(client_pubkey); //DEALLOCATE client_pubkey
@ -519,7 +600,7 @@ why2_bool perform_key_exchange_client(int connection)
why2_deallocate(read); why2_deallocate(read);
why2_deallocate(read_code); why2_deallocate(read_code);
read = read_socket_raw(connection); read = read_socket_raw(connection, NULL);
read_code = get_string_from_json_string(read, "code"); read_code = get_string_from_json_string(read, "code");
exiting_read = read_code != NULL && strcmp(read_code, WHY2_CHAT_CODE_SERVER_CLIENT_KEY_EXCHANGE) == 0; exiting_read = read_code != NULL && strcmp(read_code, WHY2_CHAT_CODE_SERVER_CLIENT_KEY_EXCHANGE) == 0;
@ -552,7 +633,7 @@ why2_bool perform_key_exchange_server(int connection, char **key)
why2_deallocate(read); why2_deallocate(read);
why2_deallocate(read_code); why2_deallocate(read_code);
read = read_socket_raw(connection); read = read_socket_raw(connection, NULL);
read_code = get_string_from_json_string(read, "code"); read_code = get_string_from_json_string(read, "code");
exiting_read = read_code != NULL && strcmp(read_code, WHY2_CHAT_CODE_CLIENT_SERVER_KEY_EXCHANGE) == 0; exiting_read = read_code != NULL && strcmp(read_code, WHY2_CHAT_CODE_CLIENT_SERVER_KEY_EXCHANGE) == 0;
@ -564,7 +645,7 @@ why2_bool perform_key_exchange_server(int connection, char **key)
//SEND CLIENT PUBKEY //SEND CLIENT PUBKEY
server_pubkey = why2_chat_ecc_serialize_public_key(); server_pubkey = why2_chat_ecc_serialize_public_key();
why2_send_socket_code(server_pubkey, NULL, connection, WHY2_CHAT_CODE_SERVER_CLIENT_KEY_EXCHANGE); why2_send_socket_code(server_pubkey, NULL, NULL, connection, WHY2_CHAT_CODE_SERVER_CLIENT_KEY_EXCHANGE);
*key = why2_chat_ecc_shared_key(client_pubkey); *key = why2_chat_ecc_shared_key(client_pubkey);
@ -577,14 +658,14 @@ why2_bool perform_key_exchange_server(int connection, char **key)
} }
//GLOBAL //GLOBAL
void why2_send_socket(char *text, char *username, int socket) void why2_send_socket(char *text, char *username, char *key, int socket)
{ {
send_socket(text, username, socket, 0, NULL); send_socket(text, username, key, socket, 0, NULL);
} }
void why2_send_socket_code(char *params, char *username, int socket, char *code) void why2_send_socket_code(char *params, char *username, char *key, int socket, char *code)
{ {
send_socket(params, username, socket, 0, code); send_socket(params, username, key, socket, 0, code);
} }
void *why2_communicate_thread(void *arg) void *why2_communicate_thread(void *arg)
@ -601,7 +682,7 @@ void *why2_communicate_thread(void *arg)
printf("User connected.\t\t%d\n", connection); printf("User connected.\t\t%d\n", connection);
send_welcome_packet(connection); //TELL USER ALL THE INFO THEY NEED send_welcome_packet(connection, client_server_key); //TELL USER ALL THE INFO THEY NEED
//GET USERNAME //GET USERNAME
char *config_username = why2_chat_server_config("user_pick_username"); char *config_username = why2_chat_server_config("user_pick_username");
@ -627,7 +708,7 @@ void *why2_communicate_thread(void *arg)
{ {
if (config_username == NULL) fprintf(stderr, "Your config doesn't contain 'user_pick_username'. Please update your configuration.\n"); if (config_username == NULL) fprintf(stderr, "Your config doesn't contain 'user_pick_username'. Please update your configuration.\n");
send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), connection, WHY2_CHAT_CODE_PICK_USERNAME); //ASK USER FOR USERNAME send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), client_server_key, connection, WHY2_CHAT_CODE_PICK_USERNAME); //ASK USER FOR USERNAME
while (invalid_username) while (invalid_username)
{ {
@ -647,7 +728,7 @@ void *why2_communicate_thread(void *arg)
why2_deallocate(code); why2_deallocate(code);
why2_deallocate(raw); why2_deallocate(raw);
if ((raw = read_user(connection, &raw_ptr)) == NULL) //READ if ((raw = read_user(connection, &raw_ptr, client_server_key)) == NULL) //READ
{ {
force_exiting = 1; //FAILURE force_exiting = 1; //FAILURE
goto deallocation; goto deallocation;
@ -691,7 +772,7 @@ void *why2_communicate_thread(void *arg)
if (invalid_username) if (invalid_username)
{ {
send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), connection, WHY2_CHAT_CODE_INVALID_USERNAME); //TELL THE USER THEY ARE DUMB AS FUCK send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), client_server_key, connection, WHY2_CHAT_CODE_INVALID_USERNAME); //TELL THE USER THEY ARE DUMB AS FUCK
continue; continue;
} }
@ -701,7 +782,7 @@ void *why2_communicate_thread(void *arg)
char *user_config_path = why2_get_server_users_path(); char *user_config_path = why2_get_server_users_path();
if (!why2_toml_contains(user_config_path, decoded_buffer)) //REGISTRATION if (!why2_toml_contains(user_config_path, decoded_buffer)) //REGISTRATION
{ {
send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), connection, WHY2_CHAT_CODE_ENTER_PASSWORD); send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), client_server_key, connection, WHY2_CHAT_CODE_ENTER_PASSWORD);
//KEEP READING UNTIL CODE ARRIVES //KEEP READING UNTIL CODE ARRIVES
char *code = NULL; char *code = NULL;
@ -713,7 +794,7 @@ void *why2_communicate_thread(void *arg)
why2_deallocate(code); why2_deallocate(code);
why2_deallocate(raw); why2_deallocate(raw);
if ((raw = read_user(connection, &raw_ptr)) == NULL) //READ if ((raw = read_user(connection, &raw_ptr, client_server_key)) == NULL) //READ
{ {
force_exiting = 1; //FAILURE force_exiting = 1; //FAILURE
goto deallocation; goto deallocation;
@ -730,7 +811,7 @@ void *why2_communicate_thread(void *arg)
why2_toml_write(user_config_path, username, password); //SAVE PASSWORD why2_toml_write(user_config_path, username, password); //SAVE PASSWORD
} else //LOGIN } else //LOGIN
{ {
send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), connection, WHY2_CHAT_CODE_ENTER_PASSWORD); send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), client_server_key, connection, WHY2_CHAT_CODE_ENTER_PASSWORD);
unsigned char max_tries = (unsigned char) server_config_int("max_password_tries"); unsigned char max_tries = (unsigned char) server_config_int("max_password_tries");
@ -746,7 +827,7 @@ void *why2_communicate_thread(void *arg)
why2_deallocate(code); why2_deallocate(code);
why2_deallocate(raw); why2_deallocate(raw);
if ((raw = read_user(connection, &raw_ptr)) == NULL) //READ if ((raw = read_user(connection, &raw_ptr, client_server_key)) == NULL) //READ
{ {
force_exiting = 1; //FAILURE force_exiting = 1; //FAILURE
goto deallocation; goto deallocation;
@ -770,7 +851,7 @@ void *why2_communicate_thread(void *arg)
goto deallocation; goto deallocation;
} }
send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), connection, WHY2_CHAT_CODE_INVALID_PASSWORD); send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), client_server_key, connection, WHY2_CHAT_CODE_INVALID_PASSWORD);
} }
} }
@ -824,7 +905,7 @@ void *why2_communicate_thread(void *arg)
while (!(exiting || force_exiting)) //KEEP COMMUNICATION ALIVE FOR 5 MINUTES [RESET TIMER AT MESSAGE SENT] while (!(exiting || force_exiting)) //KEEP COMMUNICATION ALIVE FOR 5 MINUTES [RESET TIMER AT MESSAGE SENT]
{ {
if ((raw = read_user(connection, &raw_ptr)) == NULL) break; //READ if ((raw = read_user(connection, &raw_ptr, client_server_key)) == NULL) break; //READ
json = json_tokener_parse("{}"); json = json_tokener_parse("{}");
raw_output = why2_strdup(""); raw_output = why2_strdup("");
@ -881,7 +962,7 @@ void *why2_communicate_thread(void *arg)
} while (buffer != NULL); } while (buffer != NULL);
//SEND //SEND
send_socket_code_deallocate(message, why2_chat_server_config("server_username"), connection, WHY2_CHAT_CODE_LIST_SERVER); send_socket_code_deallocate(message, why2_chat_server_config("server_username"), client_server_key, connection, WHY2_CHAT_CODE_LIST_SERVER);
//DEALLOCATION //DEALLOCATION
why2_deallocate(message); why2_deallocate(message);
@ -893,7 +974,7 @@ void *why2_communicate_thread(void *arg)
sprintf(message, "%s%c", WHY2_VERSION, '\0'); //CREATE THE MESSAGE sprintf(message, "%s%c", WHY2_VERSION, '\0'); //CREATE THE MESSAGE
//SEND //SEND
send_socket_code_deallocate(message, why2_chat_server_config("server_username"), connection, WHY2_CHAT_CODE_VERSION_SERVER); send_socket_code_deallocate(message, why2_chat_server_config("server_username"), client_server_key, connection, WHY2_CHAT_CODE_VERSION_SERVER);
//DEALLOCATION //DEALLOCATION
why2_deallocate(message); why2_deallocate(message);
@ -946,8 +1027,8 @@ void *why2_communicate_thread(void *arg)
why2_bool self_pm = pm_connection_node.connection == connection; why2_bool self_pm = pm_connection_node.connection == connection;
//SEND YOU DUMB FUCK //SEND YOU DUMB FUCK
send_socket_code_deallocate(private_msg, why2_chat_server_config("server_username"), pm_connection_node.connection, WHY2_CHAT_CODE_DM_SERVER); //RECIPIENT send_socket_code_deallocate(private_msg, why2_chat_server_config("server_username"), pm_connection_node.key, pm_connection_node.connection, WHY2_CHAT_CODE_DM_SERVER); //RECIPIENT
if (!self_pm) send_socket_code_deallocate(private_msg, why2_chat_server_config("server_username"), connection, WHY2_CHAT_CODE_DM_SERVER); //AUTHOR if (!self_pm) send_socket_code_deallocate(private_msg, why2_chat_server_config("server_username"), client_server_key, connection, WHY2_CHAT_CODE_DM_SERVER); //AUTHOR
why2_deallocate(private_msg); why2_deallocate(private_msg);
} }
@ -983,7 +1064,7 @@ void *why2_communicate_thread(void *arg)
json_object_put(json); json_object_put(json);
} }
if (exiting) send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), connection, WHY2_CHAT_CODE_SSQC); if (exiting) send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), client_server_key, connection, WHY2_CHAT_CODE_SSQC);
printf("User disconnected.\t%d\n", connection); printf("User disconnected.\t%d\n", connection);
@ -1011,12 +1092,12 @@ void *why2_authority_communicate_thread(void *arg)
printf("User connected.\t\t%d\n", connection); printf("User connected.\t\t%d\n", connection);
//SEND USER KEY EXCHANGE CODE //SEND USER KEY EXCHANGE CODE
why2_send_socket_code(NULL, NULL, connection, WHY2_CHAT_CODE_KEY_EXCHANGE); why2_send_socket_code(NULL, NULL, NULL, connection, WHY2_CHAT_CODE_KEY_EXCHANGE);
do do
{ {
//READ PACKET //READ PACKET
if ((raw = read_user(connection, &raw_ptr)) == NULL) break; //READ if ((raw = read_user(connection, &raw_ptr, NULL)) == NULL) break; //READ
//GET DATA //GET DATA
message = get_string_from_json_string(raw, "message"); message = get_string_from_json_string(raw, "message");
@ -1050,7 +1131,7 @@ void *why2_authority_communicate_thread(void *arg)
fread(buffer, buffer_size, 1, cert); //READ fread(buffer, buffer_size, 1, cert); //READ
//SEND STATUS //SEND STATUS
why2_send_socket_code(NULL, NULL, connection, strcmp(buffer, message) == 0 ? WHY2_CHAT_CODE_SUCCESS : WHY2_CHAT_CODE_FAILURE); why2_send_socket_code(NULL, NULL, NULL, connection, strcmp(buffer, message) == 0 ? WHY2_CHAT_CODE_SUCCESS : WHY2_CHAT_CODE_FAILURE);
//DEALLOCATION //DEALLOCATION
why2_deallocate(buffer); why2_deallocate(buffer);
@ -1061,7 +1142,7 @@ void *why2_authority_communicate_thread(void *arg)
fwrite(message, 1, strlen(message), cert); //WRITE PUBKEY fwrite(message, 1, strlen(message), cert); //WRITE PUBKEY
//CONFIRM SUCCESS //CONFIRM SUCCESS
why2_send_socket_code(NULL, NULL, connection, WHY2_CHAT_CODE_SUCCESS); why2_send_socket_code(NULL, NULL, NULL, connection, WHY2_CHAT_CODE_SUCCESS);
} }
//DEALLOCATION //DEALLOCATION
@ -1137,7 +1218,7 @@ void why2_clean_connections(void)
connection_buffer = *(connection_node_t*) node_buffer_2 -> value; connection_buffer = *(connection_node_t*) node_buffer_2 -> value;
send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), connection_buffer.connection, WHY2_CHAT_CODE_SSQC); send_socket_code_deallocate(NULL, why2_chat_server_config("server_username"), connection_buffer.key, connection_buffer.connection, WHY2_CHAT_CODE_SSQC);
close(connection_buffer.connection); close(connection_buffer.connection);
why2_list_remove(&connection_list, node_buffer_2); //REMOVE why2_list_remove(&connection_list, node_buffer_2); //REMOVE
@ -1195,7 +1276,7 @@ void *why2_listen_server(void *socket)
{ {
continuing = 0; continuing = 0;
read = read_socket_raw(connection); read = read_socket_raw(connection, why2_chat_get_client_server_key());
if (read == NULL) continue; if (read == NULL) continue;
//GET CONTENT //GET CONTENT
@ -1378,7 +1459,7 @@ void *why2_listen_authority(void *socket)
do do
{ {
//READ PACKET //READ PACKET
read = read_socket_raw(socket_ptr); read = read_socket_raw(socket_ptr, NULL);
if (read == NULL) continue; //INVALID PACKET RECEIVED if (read == NULL) continue; //INVALID PACKET RECEIVED
//GET DATA //GET DATA
@ -1418,7 +1499,7 @@ void *why2_listen_authority(void *socket)
//SEND CA CLIENT'S ENCRYPTED PUBKEY //SEND CA CLIENT'S ENCRYPTED PUBKEY
char *key = why2_chat_ecc_serialize_public_key(); char *key = why2_chat_ecc_serialize_public_key();
why2_send_socket_code(key, username, socket_ptr, WHY2_CHAT_CODE_CLIENT_KEY_EXCHANGE); //SEND why2_send_socket_code(key, username, NULL, socket_ptr, WHY2_CHAT_CODE_CLIENT_KEY_EXCHANGE); //SEND
//DEALLOCATION //DEALLOCATION
why2_deallocate(user_config_path); why2_deallocate(user_config_path);

View File

@ -70,6 +70,7 @@ why2_output_flags why2_decrypt_text(char *text, char *key)
char *key_new = why2_strdup(key); //COPY key TO key_new char *key_new = why2_strdup(key); //COPY key TO key_new
int *encrypted_text_key_chain; int *encrypted_text_key_chain;
char *used_text = NULL; //COPY text TO used_text char *used_text = NULL; //COPY text TO used_text
unsigned long returning_len = 0;
if (why2_get_flags().format == WHY2_OUTPUT_BYTE) if (why2_get_flags().format == WHY2_OUTPUT_BYTE)
{ {
@ -122,7 +123,8 @@ why2_output_flags why2_decrypt_text(char *text, char *key)
} }
//SET LENGTH (number_buffer) //SET LENGTH (number_buffer)
returning_text = why2_calloc(number_buffer + 1, sizeof(char)); returning_len = number_buffer + 1;
returning_text = why2_calloc(returning_len, sizeof(char));
text_key_chain = why2_malloc(sizeof(int) * number_buffer); text_key_chain = why2_malloc(sizeof(int) * number_buffer);
encrypted_text_key_chain = why2_malloc(sizeof(int) * number_buffer); encrypted_text_key_chain = why2_malloc(sizeof(int) * number_buffer);
text_key_chainLength = number_buffer; text_key_chainLength = number_buffer;
@ -213,7 +215,8 @@ why2_output_flags why2_decrypt_text(char *text, char *key)
} }
//PUT PADDED TEXT INTO text_new //PUT PADDED TEXT INTO text_new
returning_text = why2_recalloc(returning_text, why2_list_get_size(&split_text) + 1, sizeof(char)); returning_len = why2_list_get_size(&split_text) + 1;
returning_text = why2_recalloc(returning_text, returning_len, sizeof(char));
why2_node_t *buffer = split_text.head; why2_node_t *buffer = split_text.head;
why2_node_t *buffer_2; why2_node_t *buffer_2;
unsigned long index_buffer = 0; unsigned long index_buffer = 0;
@ -237,6 +240,7 @@ why2_output_flags why2_decrypt_text(char *text, char *key)
why2_output_flags output = why2_output_flags output =
{ {
returning_text, //DECRYPTED TEXT returning_text, //DECRYPTED TEXT
returning_len, //LENGTH
key_new, //USED KEY key_new, //USED KEY
why2_count_unused_key_size(returning_text, key_new), // NUMBER OF WHY2_UNUSED CHARS IN KEY why2_count_unused_key_size(returning_text, key_new), // NUMBER OF WHY2_UNUSED CHARS IN KEY
why2_count_repeated_key_size(returning_text, key_new), //NUMBER OF REPEATED CHARS IN KEY why2_count_repeated_key_size(returning_text, key_new), //NUMBER OF REPEATED CHARS IN KEY

View File

@ -61,6 +61,7 @@ why2_output_flags why2_encrypt_text(char *text, char *key)
char *text_buffer = NULL; char *text_buffer = NULL;
int *text_key_chain; int *text_key_chain;
int number_buffer = 0; int number_buffer = 0;
unsigned long returning_len = 0;
if (key != NULL) if (key != NULL)
{ {
@ -149,7 +150,8 @@ why2_output_flags why2_encrypt_text(char *text, char *key)
} }
//ALLOCATE returning_text (WITH THE SEPARATORS) //ALLOCATE returning_text (WITH THE SEPARATORS)
returning_text = why2_calloc(number_buffer + strlen(text_new), sizeof(char)); returning_len = number_buffer + strlen(text_new);
returning_text = why2_calloc(returning_len, sizeof(char));
//LOAD returning_text //LOAD returning_text
for (int i = 0; i < (int) strlen(text_new); i++) for (int i = 0; i < (int) strlen(text_new); i++)
@ -171,7 +173,8 @@ why2_output_flags why2_encrypt_text(char *text, char *key)
{ {
number_buffer = (strlen(text_new) + 1) * 2; //EACH CHARACTER WILL BE SPLIT INTO TWO CHARS AND FIRST TWO WILL BE LENGTH OF text_new number_buffer = (strlen(text_new) + 1) * 2; //EACH CHARACTER WILL BE SPLIT INTO TWO CHARS AND FIRST TWO WILL BE LENGTH OF text_new
returning_text = why2_calloc(number_buffer + 1, sizeof(char)); //ALLOCATE returning_len = number_buffer + 1;
returning_text = why2_calloc(returning_len, sizeof(char)); //ALLOCATE
//SET LENGTH //SET LENGTH
returning_text[0] = (strlen(text_new) & 0x7f) + 1; //+1 BECAUSE WE DON'T WANT \0 returning_text[0] = (strlen(text_new) & 0x7f) + 1; //+1 BECAUSE WE DON'T WANT \0
@ -199,6 +202,7 @@ why2_output_flags why2_encrypt_text(char *text, char *key)
why2_output_flags output = why2_output_flags output =
{ {
returning_text, //ENCRYPTED TEXT returning_text, //ENCRYPTED TEXT
returning_len, //LENGTH
key_new, //GENERATED/USED KEY key_new, //GENERATED/USED KEY
why2_count_unused_key_size(text_new, key_new), // NUMBER OF WHY2_UNUSED CHARS IN KEY why2_count_unused_key_size(text_new, key_new), // NUMBER OF WHY2_UNUSED CHARS IN KEY
why2_count_repeated_key_size(text_new, key_new), //NUMBER OF REPEATED CHARS IN KEY why2_count_repeated_key_size(text_new, key_new), //NUMBER OF REPEATED CHARS IN KEY

View File

@ -74,17 +74,17 @@ why2_input_flags why2_get_flags(void)
why2_output_flags why2_no_output(enum WHY2_EXIT_CODES exit_code) why2_output_flags why2_no_output(enum WHY2_EXIT_CODES exit_code)
{ {
char *emptyText = why2_malloc(1); //TEXT char *empty_text = why2_malloc(1); //TEXT
emptyText[0] = '\0'; empty_text[0] = '\0';
char *emptyKey = why2_malloc(why2_get_key_length() + 1); //KEY char *empty_key = why2_malloc(why2_get_key_length() + 1); //KEY
for (int i = 0; i < (int) why2_get_key_length(); i++) for (unsigned long i = 0; i < why2_get_key_length(); i++)
{ {
emptyKey[i] = 'x'; empty_key[i] = 'x';
} }
emptyKey[why2_get_key_length()] = '\0'; empty_key[why2_get_key_length()] = '\0';
return (why2_output_flags) { emptyText, emptyKey, 0, 0, 0, exit_code }; return (why2_output_flags) { empty_text, 0, empty_key, 0, 0, 0, exit_code };
} }
why2_encryption_operation_cb why2_get_encryption_operation(void) why2_encryption_operation_cb why2_get_encryption_operation(void)