aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorGravatar Frank Denis <github@pureftpd.org>2017-12-30 08:45:57 +0100
committerGravatar Frank Denis <github@pureftpd.org>2017-12-30 08:45:57 +0100
commit8c8da901528659820ff40f923fe3a4b69d76e94a (patch)
treea987411402cd7103071395663081c5914e1ecf45 /src
parent62f4512220e7b80dbe8ad8ed1ac63e399c01f484 (diff)
downloadtweetpipe-8c8da901528659820ff40f923fe3a4b69d76e94a.tar.gz
Format
Diffstat (limited to 'src')
-rw-r--r--src/encpipe.c47
-rw-r--r--src/safe_rw.c3
-rw-r--r--src/safe_rw.h6
3 files changed, 20 insertions, 36 deletions
diff --git a/src/encpipe.c b/src/encpipe.c
index 6fd24c4..d3d4b0d 100644
--- a/src/encpipe.c
+++ b/src/encpipe.c
@@ -1,9 +1,8 @@
#include "encpipe_p.h"
static struct option getopt_long_options[] = {
- { "help", 0, NULL, 'h' }, { "decrypt", 0, NULL, 'd' },
- { "encrypt", 0, NULL, 'e' }, { "in", 1, NULL, 'i' },
- { "out", 1, NULL, 'o' }, { "p", 1, NULL, 'p' },
+ { "help", 0, NULL, 'h' }, { "decrypt", 0, NULL, 'd' }, { "encrypt", 0, NULL, 'e' },
+ { "in", 1, NULL, 'i' }, { "out", 1, NULL, 'o' }, { "p", 1, NULL, 'p' },
{ NULL, 0, NULL, 0 }
};
static const char *getopt_options = "hdei:o:p:";
@@ -32,8 +31,8 @@ options_parse(Context *ctx, int argc, char *argv[])
#ifdef _OPTRESET
optreset = 1;
#endif
- while ((opt_flag = getopt_long(argc, argv, getopt_options,
- getopt_long_options, &option_index)) != -1) {
+ while ((opt_flag = getopt_long(argc, argv, getopt_options, getopt_long_options,
+ &option_index)) != -1) {
switch (opt_flag) {
case 'd':
ctx->encrypt = 0;
@@ -67,11 +66,7 @@ file_open(const char *file, int create)
if (file == NULL || (file[0] == '-' && file[1] == 0)) {
return create ? STDOUT_FILENO : STDIN_FILENO;
}
- if (create) {
- fd = open(file, O_CREAT | O_WRONLY | O_TRUNC, 0644);
- } else {
- fd = open(file, O_RDONLY);
- }
+ fd = create ? open(file, O_CREAT | O_WRONLY | O_TRUNC, 0644) : open(file, O_RDONLY);
if (fd == -1) {
fprintf(stderr, "Unable to access [%s]: [%s]\n", file, strerror(errno));
exit(1);
@@ -83,11 +78,10 @@ static void
derive_key(Context *ctx)
{
static uint8_t master_key[hydro_pwhash_MASTERKEYBYTES] = { 0 };
- size_t password_len = strlen(ctx->password);
+ size_t password_len = strlen(ctx->password);
- if (hydro_pwhash_deterministic(ctx->key, sizeof ctx->key, ctx->password,
- password_len, HYDRO_CONTEXT, master_key,
- PWHASH_OPSLIMIT, PWHASH_MEMLIMIT,
+ if (hydro_pwhash_deterministic(ctx->key, sizeof ctx->key, ctx->password, password_len,
+ HYDRO_CONTEXT, master_key, PWHASH_OPSLIMIT, PWHASH_MEMLIMIT,
PWHASH_THREADS) != 0) {
fprintf(stderr, "Password hashing failed\n");
exit(1);
@@ -108,17 +102,15 @@ stream_encrypt(Context *ctx)
max_chunk_size = ctx->sizeof_buf - 4 - hydro_secretbox_HEADERBYTES;
assert(max_chunk_size <= 0x7fffffff);
chunk_id = 0;
- while ((chunk_size =
- safe_read_partial(ctx->fd_in, chunk, max_chunk_size)) >= 0) {
+ while ((chunk_size = safe_read_partial(ctx->fd_in, chunk, max_chunk_size)) >= 0) {
STORE32_LE(chunk_size_p, (uint32_t) chunk_size);
- if (hydro_secretbox_encrypt(chunk, chunk, chunk_size, chunk_id,
- HYDRO_CONTEXT, ctx->key) != 0) {
+ if (hydro_secretbox_encrypt(chunk, chunk, chunk_size, chunk_id, HYDRO_CONTEXT, ctx->key) !=
+ 0) {
fprintf(stderr, "Encryption error\n");
exit(1);
}
if (safe_write(ctx->fd_out, chunk_size_p,
- 4 + hydro_secretbox_HEADERBYTES + (size_t) chunk_size,
- -1) < 0) {
+ 4 + hydro_secretbox_HEADERBYTES + (size_t) chunk_size, -1) < 0) {
perror("write()");
exit(1);
}
@@ -151,22 +143,17 @@ stream_decrypt(Context *ctx)
while ((readnb = safe_read(ctx->fd_in, chunk_size_p, 4)) == 4) {
chunk_size = LOAD32_LE(chunk_size_p);
if (chunk_size > max_chunk_size) {
- fprintf(stderr, "Chunk size too large ([%zd] > [%zd])\n",
- chunk_size, max_chunk_size);
+ fprintf(stderr, "Chunk size too large ([%zd] > [%zd])\n", chunk_size, max_chunk_size);
exit(1);
}
- if (safe_read(ctx->fd_in, chunk,
- (size_t) chunk_size + hydro_secretbox_HEADERBYTES) !=
+ if (safe_read(ctx->fd_in, chunk, (size_t) chunk_size + hydro_secretbox_HEADERBYTES) !=
chunk_size + hydro_secretbox_HEADERBYTES) {
- fprintf(stderr, "Chunk too short ([%zd] bytes expected)\n",
- chunk_size);
+ fprintf(stderr, "Chunk too short ([%zd] bytes expected)\n", chunk_size);
exit(1);
}
- if (hydro_secretbox_decrypt(chunk, chunk,
- chunk_size + hydro_secretbox_HEADERBYTES,
+ if (hydro_secretbox_decrypt(chunk, chunk, chunk_size + hydro_secretbox_HEADERBYTES,
chunk_id, HYDRO_CONTEXT, ctx->key) != 0) {
- fprintf(stderr, "Unable to decrypt chunk #%" PRIu64 " - ",
- chunk_id);
+ fprintf(stderr, "Unable to decrypt chunk #%" PRIu64 " - ", chunk_id);
if (chunk_id == 0) {
fprintf(stderr, "Wrong password or key?\n");
} else {
diff --git a/src/safe_rw.c b/src/safe_rw.c
index 683d8b5..fb1aae9 100644
--- a/src/safe_rw.c
+++ b/src/safe_rw.c
@@ -15,8 +15,7 @@
#include "safe_rw.h"
ssize_t
-safe_write(const int fd, const void *const buf_, size_t count,
- const int timeout)
+safe_write(const int fd, const void *const buf_, size_t count, const int timeout)
{
struct pollfd pfd;
const char * buf = (const char *) buf_;
diff --git a/src/safe_rw.h b/src/safe_rw.h
index 31f4aa6..26cc627 100644
--- a/src/safe_rw.h
+++ b/src/safe_rw.h
@@ -4,12 +4,10 @@
#include <stdlib.h>
#include <sys/types.h>
-ssize_t safe_write(const int fd, const void* const buf_, size_t count,
- const int timeout);
+ssize_t safe_write(const int fd, const void* const buf_, size_t count, const int timeout);
ssize_t safe_read(const int fd, void* const buf_, size_t count);
-ssize_t safe_read_partial(const int fd, void* const buf_,
- const size_t max_count);
+ssize_t safe_read_partial(const int fd, void* const buf_, const size_t max_count);
#endif