From b9f80a2b37edf9682f189b406542b3f7a93b24a3 Mon Sep 17 00:00:00 2001 From: kaotisk Date: Wed, 2 Apr 2025 20:54:37 +0300 Subject: Moved directory and some experimental changes --- c_implementation/Makefile.am | 27 ++ c_implementation/build.sh | 10 + c_implementation/build_tree/ak_fs_build.sh | 15 + c_implementation/build_tree/ak_log_build.sh | 13 + c_implementation/build_tree/ak_logcatter_build.sh | 7 + c_implementation/build_tree/ak_settings_build.sh | 11 + c_implementation/build_tree/ak_utils_build.sh | 2 + .../build_tree/libsodium_test_build.sh | 1 + c_implementation/configure.ac | 11 + c_implementation/include/libakfs.h | 119 +++++++ c_implementation/include/libaklog.h | 24 ++ c_implementation/include/libaklogcatter.h | 6 + c_implementation/include/libaksettings.h | 25 ++ c_implementation/include/libakutils.h | 24 ++ c_implementation/src/akfs.c | 349 +++++++++++++++++++++ c_implementation/src/aklog.c | 287 +++++++++++++++++ c_implementation/src/aklogcatter.c | 35 +++ c_implementation/src/aksettings.c | 118 +++++++ c_implementation/src/akutils.c | 8 + c_implementation/tests/test_akfs.c | 213 +++++++++++++ c_implementation/tests/test_akfs_mkdir.c | 38 +++ c_implementation/tests/test_aklog.c | 72 +++++ c_implementation/tests/test_aklogcatter.c | 7 + c_implementation/tests/test_aklogwrite.c | 16 + c_implementation/tests/test_aksettings.c | 53 ++++ c_implementation/tests/test_aksettings_read.c | 23 ++ c_implementation/tests/test_akutils.c | 7 + c_implementation/tests/test_sha512_string.c | 70 +++++ src/akfs.c | 326 ------------------- src/aklog.c | 289 ----------------- src/aklogcatter.c | 35 --- src/aksettings.c | 8 - src/build.sh | 10 - src/build_tree/ak_fs_build.sh | 15 - src/build_tree/ak_log_build.sh | 13 - src/build_tree/ak_logcatter_build.sh | 7 - src/build_tree/ak_settings_build.sh | 7 - src/include/akfs.h | 25 -- src/include/aklog.h | 16 - src/include/aklogcatter.h | 6 - src/include/aksettings.h | 6 - src/new_lib.sh | 83 ----- src/tests/test_akfs.c | 205 ------------ src/tests/test_akfs_mkdir.c | 38 --- src/tests/test_aklog.c | 72 ----- src/tests/test_aklogcatter.c | 7 - src/tests/test_aklogwrite.c | 13 - src/tests/test_aksettings.c | 7 - 48 files changed, 1591 insertions(+), 1188 deletions(-) create mode 100644 c_implementation/Makefile.am create mode 100755 c_implementation/build.sh create mode 100755 c_implementation/build_tree/ak_fs_build.sh create mode 100755 c_implementation/build_tree/ak_log_build.sh create mode 100755 c_implementation/build_tree/ak_logcatter_build.sh create mode 100755 c_implementation/build_tree/ak_settings_build.sh create mode 100755 c_implementation/build_tree/ak_utils_build.sh create mode 100755 c_implementation/build_tree/libsodium_test_build.sh create mode 100644 c_implementation/configure.ac create mode 100644 c_implementation/include/libakfs.h create mode 100644 c_implementation/include/libaklog.h create mode 100644 c_implementation/include/libaklogcatter.h create mode 100644 c_implementation/include/libaksettings.h create mode 100644 c_implementation/include/libakutils.h create mode 100644 c_implementation/src/akfs.c create mode 100644 c_implementation/src/aklog.c create mode 100644 c_implementation/src/aklogcatter.c create mode 100644 c_implementation/src/aksettings.c create mode 100644 c_implementation/src/akutils.c create mode 100644 c_implementation/tests/test_akfs.c create mode 100644 c_implementation/tests/test_akfs_mkdir.c create mode 100644 c_implementation/tests/test_aklog.c create mode 100644 c_implementation/tests/test_aklogcatter.c create mode 100644 c_implementation/tests/test_aklogwrite.c create mode 100644 c_implementation/tests/test_aksettings.c create mode 100644 c_implementation/tests/test_aksettings_read.c create mode 100644 c_implementation/tests/test_akutils.c create mode 100644 c_implementation/tests/test_sha512_string.c delete mode 100644 src/akfs.c delete mode 100644 src/aklog.c delete mode 100644 src/aklogcatter.c delete mode 100644 src/aksettings.c delete mode 100755 src/build.sh delete mode 100755 src/build_tree/ak_fs_build.sh delete mode 100755 src/build_tree/ak_log_build.sh delete mode 100755 src/build_tree/ak_logcatter_build.sh delete mode 100755 src/build_tree/ak_settings_build.sh delete mode 100644 src/include/akfs.h delete mode 100644 src/include/aklog.h delete mode 100644 src/include/aklogcatter.h delete mode 100644 src/include/aksettings.h delete mode 100755 src/new_lib.sh delete mode 100644 src/tests/test_akfs.c delete mode 100644 src/tests/test_akfs_mkdir.c delete mode 100644 src/tests/test_aklog.c delete mode 100644 src/tests/test_aklogcatter.c delete mode 100644 src/tests/test_aklogwrite.c delete mode 100644 src/tests/test_aksettings.c diff --git a/c_implementation/Makefile.am b/c_implementation/Makefile.am new file mode 100644 index 0000000..507550f --- /dev/null +++ b/c_implementation/Makefile.am @@ -0,0 +1,27 @@ +ACLOCAL_AMFLAGS = -I m4 +AM_CPPFLAGS = -I$(top_srcdir)/include + + +# Link each test to the library +#$(test_programs): % : %.c +# $(CC) $(AM_CPPFLAGS) $(CPPFLAGS) $(CFLAGS) -o $@ $< $(LDFLAGS) libmylib.la +# +# +# Build shared library from root dir sources + +lib_LTLIBRARIES = libaklog.la +libaklog_la_SOURCES = $(top_srcdir)/src/aklog.c +include_HEADERS = include/libaklog.h + +## Build tests (no SUBDIRS needed) +check_PROGRAMS = test_aklog +test_aklog_SOURCES = ./tests/test_aklog.c +test_aklog_LDADD = libaklog.la +tests_test_main_CPPFLAGS = -I$(top_srcdir)/include # For tests too + +# Enable 'make check' to run tests +TESTS = $(check_PROGRAMS) + +# Optional: Clean test binaries aggressively +CLEANFILES = $(TESTS) + diff --git a/c_implementation/build.sh b/c_implementation/build.sh new file mode 100755 index 0000000..183f022 --- /dev/null +++ b/c_implementation/build.sh @@ -0,0 +1,10 @@ +#!/usr/bin/env bash +if [ ! -d $PWD/lib ] +then + mkdir $PWD/lib +fi + +find build_tree -type f | while read build_script +do + bash ${build_script} +done diff --git a/c_implementation/build_tree/ak_fs_build.sh b/c_implementation/build_tree/ak_fs_build.sh new file mode 100755 index 0000000..a18b824 --- /dev/null +++ b/c_implementation/build_tree/ak_fs_build.sh @@ -0,0 +1,15 @@ +#!/usr/bin/env bash + +echo "Building lib/akfs.so" && \ +gcc -c -shared -Wextra -Wall -Werror -pedantic -ggdb -fPIC -I./include akfs.c -o lib/akfs.so && \ +echo "Building tests/test_akfs" && \ +gcc -Wextra -Wall -Werror -pedantic -ggdb -Wl,-rpath=lib -I./include tests/test_akfs.c lib/akfs.so -o tests/test_akfs && \ +echo "Running test_akfs" && \ +time ./tests/test_akfs && \ +rm ./tests/test_akfs + +echo "Building tests/test_akfs_mkdir.c" && \ +gcc -Wextra -Wall -Werror -pedantic -ggdb -Wl,-rpath=lib -I./include tests/test_akfs_mkdir.c lib/akfs.so -o tests/test_akfs_mkdir && \ +echo "Running test_akfs_mkdir" && \ +time ./tests/test_akfs_mkdir && \ +rm ./tests/test_akfs_mkdir diff --git a/c_implementation/build_tree/ak_log_build.sh b/c_implementation/build_tree/ak_log_build.sh new file mode 100755 index 0000000..713b915 --- /dev/null +++ b/c_implementation/build_tree/ak_log_build.sh @@ -0,0 +1,13 @@ +#!/usr/bin/env bash + +echo "Building lib/aklog.so" && \ +gcc -c -shared -Wextra -Wall -Werror -pedantic -ggdb -fPIC -I./include aklog.c -o lib/aklog.so && \ +echo "Building tests/test_aklog" && \ +gcc -Wextra -Wall -Werror -pedantic -ggdb -Wl,-rpath=lib -I./include tests/test_aklog.c lib/aklog.so -o tests/test_aklog && \ +echo "Running test_aklog" && \ +time ./tests/test_aklog # && \ +# rm ./tests/test_aklog +gcc -Wextra -Wall -Werror -pedantic -ggdb -Wl,-rpath=lib -I./include tests/test_aklogwrite.c lib/aklog.so -o tests/test_aklogwrite && \ +echo "Running test_aklogwrite" && \ +time ./tests/test_aklogwrite && \ +rm ./tests/test_aklogwrite diff --git a/c_implementation/build_tree/ak_logcatter_build.sh b/c_implementation/build_tree/ak_logcatter_build.sh new file mode 100755 index 0000000..5038073 --- /dev/null +++ b/c_implementation/build_tree/ak_logcatter_build.sh @@ -0,0 +1,7 @@ +echo "Building lib/aklogcatter.so" && \ +gcc -c -shared -Wextra -Wall -Werror -pedantic -ggdb -fPIC -I./include aklogcatter.c -o lib/aklogcatter.so && \ +echo "Building tests/test_aklogcatter" && \ +gcc -Wextra -Wall -Werror -pedantic -ggdb -Wl,-rpath=lib -I./include tests/test_aklogcatter.c lib/aklog.so lib/aklogcatter.so -o tests/test_aklogcatter && \ +echo "Running test_aklogcatter" && \ +time ./tests/test_aklogcatter && \ +rm ./tests/test_aklogcatter diff --git a/c_implementation/build_tree/ak_settings_build.sh b/c_implementation/build_tree/ak_settings_build.sh new file mode 100755 index 0000000..09009a8 --- /dev/null +++ b/c_implementation/build_tree/ak_settings_build.sh @@ -0,0 +1,11 @@ +echo "Building lib/aksettings.so" && \ +gcc -c -shared -Wextra -Wall -Werror -pedantic -ggdb -fPIC -I./include aksettings.c -o lib/aksettings.so && \ +echo "Building tests/test_aksettings" && \ +gcc -Wextra -Wall -Werror -pedantic -ggdb -Wl,-rpath=lib -I./include tests/test_aksettings.c lib/aklog.so lib/aksettings.so -o tests/test_aksettings && \ +echo "Running test_aksettings" && \ +time ./tests/test_aksettings && \ +rm ./tests/test_aksettings +gcc -Wextra -Wall -Werror -pedantic -ggdb -Wl,-rpath=lib -I./include tests/test_aksettings_read.c lib/aklog.so lib/aksettings.so -o tests/test_aksettings_read && \ +echo "Running test_aksettings_read" && \ +time ./tests/test_aksettings_read && \ +rm ./tests/test_aksettings_read diff --git a/c_implementation/build_tree/ak_utils_build.sh b/c_implementation/build_tree/ak_utils_build.sh new file mode 100755 index 0000000..4300307 --- /dev/null +++ b/c_implementation/build_tree/ak_utils_build.sh @@ -0,0 +1,2 @@ +echo "Building lib/akutils.so" && gcc -c -shared -Wextra -Wall -Werror -pedantic -ggdb -fPIC -I./include akutils.c -o lib/akutils.so && echo "Building tests/test_akutils" && gcc -Wextra -Wall -Werror -pedantic -ggdb -Wl,-rpath=lib -I./include tests/test_akutils.c lib/akutils.so -o tests/test_akutils && echo "Running test_akutils" && time ./tests/test_akutils +rm ./tests/test_akutils diff --git a/c_implementation/build_tree/libsodium_test_build.sh b/c_implementation/build_tree/libsodium_test_build.sh new file mode 100755 index 0000000..0897835 --- /dev/null +++ b/c_implementation/build_tree/libsodium_test_build.sh @@ -0,0 +1 @@ +gcc -Wextra -Wall -Werror -pedantic -ggdb -Wl,-rpath=lib -I./include -lsodium tests/libsodium.c lib/aklog.so -o watah diff --git a/c_implementation/configure.ac b/c_implementation/configure.ac new file mode 100644 index 0000000..477ec5c --- /dev/null +++ b/c_implementation/configure.ac @@ -0,0 +1,11 @@ +AC_INIT([akt], [0.0.0]) +AM_INIT_AUTOMAKE([foreign subdir-objects]) +AC_CONFIG_MACRO_DIRS([m4]) +LT_INIT([shared]) + +AC_PROG_CC +AC_CONFIG_FILES([Makefile]) + +AC_CHECK_HEADERS([stdlib.h stdio.h]) + +AC_OUTPUT diff --git a/c_implementation/include/libakfs.h b/c_implementation/include/libakfs.h new file mode 100644 index 0000000..bc5703c --- /dev/null +++ b/c_implementation/include/libakfs.h @@ -0,0 +1,119 @@ +#ifndef AKFS +#define AKFS + +#include + +/** + * This struct represents a HEX output of the SHA-512 algorithm. + * + */ +typedef struct { + /** + * The array below has size of 8, which can store the 128 characters into + * 16 digit length variables. + * + * While 512bits/8bits=64bytes, into converting to characters, we use 2bytes + * per one digit, which gives us the 128 characters. + * + */ + long unsigned int sum[8]; +} sha512sum; + +/** + * This struct describes explicitly the structure of a root_hash. It is the root + * of a hash merkle tree. Note, that this structure can be used for roots and + * branches. Possibly, the name will change to something more generic in the + * future. + * Another note is that instead of approaching this as left and right, as seen + * in other codebases, we do a head-tail naming. That's because of the BASH + * implementation that you can find at lib/_ak_fs. + * + */ +typedef struct { + /** + * Hash of the thing + */ + sha512sum root; + /** + * Hash of head + */ + sha512sum head; + /** + * Hash of tail + */ + sha512sum tail; +} root_hash; + +/** + * This is the current structure of an akfs_map. Due to potential short-comings + * of it, akfs_map_v4 was introduced. Versions v1 and v2 won't be appearing in + * this header file, since they were long abandoned. Version v0, on the other + * hand, is what is called now as a root_hash. Refer to it for more. + * + */ +typedef struct { + /** + * Original file's hash + * + */ + sha512sum oh; + /** + * Original file's name + * + */ + char* filename; + /** + * Root hash + * + */ + sha512sum rh; + /** + * Should be "level.1.map" at all times + * + */ + char* root_name; +} akfs_map_v3; + +/** + * This is a proposed structure for akfs_map. It is called after its version. + * Previous versions have been mostly abandoned, except v3 which is where v4 + * was derived from. See akfs_map_v3 for more. + * + */ +typedef struct { + /** + * Original file's hash + * + */ + sha512sum oh; + /** + * Original filename's AKFS maphash + * + */ + sha512sum fn; + /** + * Root hash + * + */ + sha512sum rh; +} akfs_map_v4; + +//typedef char[64] sha512sum_as_string; + +char* ak_fs_return_hash_path(char*); + +char* ak_fs_return_hash_dir(char*); + +bool ak_fs_verify_input_is_hash(char*); + +int ak_fs_create_dir_for_hash(char*); + +sha512sum ak_fs_sha512sum_string_to_struct(char*); + +void ak_fs_sha512sum_struct_to_string(sha512sum, char*); + +int ak_fs_open_map_v3(char*); +int ak_fs_from_map_v3_to_file(akfs_map_v3); + +#endif // AKFS + diff --git a/c_implementation/include/libaklog.h b/c_implementation/include/libaklog.h new file mode 100644 index 0000000..31478a7 --- /dev/null +++ b/c_implementation/include/libaklog.h @@ -0,0 +1,24 @@ +#ifndef AKLOG +#define AKLOG + +typedef enum { + INFO, + WARNING, + ERROR, + EXIT, + DEBUG +} LogMessageType; + +void ak_log_print_log_line(char* line); +void ak_log_follow(); +void ak_log_grep(char* string); +void ak_log_rotate(); +int ak_log_write_to_file(char* message); +void ak_log_message(const char* program, LogMessageType lmtype, char* message); +void ak_log_exit(const char* program, char* message); +void ak_log_warning(const char* program, char* message); +void ak_log_debug(const char* program, char* message); +void ak_log_error(const char* program, char* message); +void ak_log_info(const char* program, char* message); + +#endif // AKLOG diff --git a/c_implementation/include/libaklogcatter.h b/c_implementation/include/libaklogcatter.h new file mode 100644 index 0000000..650ef7c --- /dev/null +++ b/c_implementation/include/libaklogcatter.h @@ -0,0 +1,6 @@ +#ifndef AK_LOGCATTER_H +#define AK_LOGCATTER_H + +int ak_logcatter(); + +#endif // AK_LOGCATTER_H diff --git a/c_implementation/include/libaksettings.h b/c_implementation/include/libaksettings.h new file mode 100644 index 0000000..e95f37d --- /dev/null +++ b/c_implementation/include/libaksettings.h @@ -0,0 +1,25 @@ +#ifndef AK_SETTINGS_H +#define AK_SETTINGS_H + +#include + +typedef struct { + char *key; + char *value; +} AKSetting; + +int ak_settings(); +void ak_settings_print_setting(AKSetting); +int ak_settings_from_file(); +int ak_setting_to_file(AKSetting); + + +const char *ak_settings_get_setting(const char *key); +bool ak_settings_set_setting(const char *key, const char *value); +bool ak_settings_save_settings(); +bool ak_settings_load_settings_binary(); +int ak_settings_find_setting(const char *key); +void ak_settings_free_settings(); +bool ak_settings_save_settings_binary(); + +#endif // AK_SETTINGS_H diff --git a/c_implementation/include/libakutils.h b/c_implementation/include/libakutils.h new file mode 100644 index 0000000..4243b64 --- /dev/null +++ b/c_implementation/include/libakutils.h @@ -0,0 +1,24 @@ +#ifndef AK_UTILS_H +#define AK_UTILS_H + +int ak_utils(); + +typedef long unsigned int UnixSeconds; + +/** + * + * function _ak_datetime_unix(); + * + * function _ak_datetime_unix_nanosecs(); + * + * function _ak_datetime_human(); + * + * function _ak_datetime_human_date_only(); + * + * function _ak_datetime_human_date_only_yesterday(); + * + * function _ak_datetime_unix_to_human(); + * + */ + +#endif // AK_UTILS_H diff --git a/c_implementation/src/akfs.c b/c_implementation/src/akfs.c new file mode 100644 index 0000000..a71a003 --- /dev/null +++ b/c_implementation/src/akfs.c @@ -0,0 +1,349 @@ +#include +#include +#include +#include +#include +#include +#include + +char* ak_fs_return_hash_path(char* string) +{ + if ( ak_fs_verify_input_is_hash(string) ) + { + unsigned int i = 0; + char *result = malloc((128*2)+1); + while ( string[i] != '\0' ) + { + result[i*2] = string[i]; + if ( (i*2) + 1 <= 254 ) + { + result[(i*2)+1] = '/'; + } + else + { + result[(i*2)+1] = '\0'; + } + ++i; + } + return result; + } + else + { + return NULL; + } +} + +char* ak_fs_return_hash_dir(char* string) +{ + if ( ak_fs_verify_input_is_hash(string) ) + { + unsigned int i = 0; + char *result = malloc((128*2)+1); + while ( string[i] != '\0' ) + { + result[i*2] = string[i]; + if ( (i*2) + 1 <= 254-2 ) + { + result[(i*2)+1] = '/'; + } + else + { + result[(i*2)+1] = '\0'; + } + ++i; + } + return result; + } + else + { + return NULL; + } +} + +bool ak_fs_verify_input_is_hash(char* string) +{ + unsigned int i = 0; + while ( string[i] != '\0' ) + { + if ( + i < 128 && + !( + ( string[i] >= 0x30 ) && + (( string[i] <= 0x39) || ( string[i] >= 0x61 )) && + ( string[i] <= 0x66 ) + ) + ) + { + return false; + } + else { + i++; + } + } + if ( i > 128 ) + { + return false; + } + return true; +} + +int ak_fs_create_dir_for_hash(char* string) +{ + /* TODO + * Some aspects of this function + * 1. We need a "root" place to put our dirs into, this is not specified + * anywhere in this code but it is spartially specified in other files + * like lib/_ak_fs bash script and the rc/config file we currently source + * in $HOME/.bashrc + * 2. We might need to "lock" onto some version of glibc and be aware of + * other systems that do not use that one. + */ + if ( ak_fs_verify_input_is_hash(string) ) + { + char* dir_path = ak_fs_return_hash_dir(string); + // We will need to separate the string so we can create the path one + // directory at the time + int len = strlen(dir_path); + for ( int i = 0; i < len+1; ++i) + { + if ( dir_path[i] == '/' ) + { + //printf("%c\n", dir_path[i]); + //char* test = strndup(dir_path, i); + //printf("A: [i:%d] [c:%c] - %s\n", i, dir_path[i], test); + continue; + } + else + { + char* incremental_dir_path = strndup(dir_path, i+1); + // printf("B: [i:%d] [c:%c] - %s\n", i, dir_path[i], test); + struct stat sb; + if (stat(incremental_dir_path, &sb) == 0 && S_ISDIR(sb.st_mode)) + { + continue; + } + else + { + int return_code = mkdir(incremental_dir_path, 0777); + if ( return_code == 0 ) + { + continue; + } + else + { + // should be unreachable I guess since previous checks + // though it could be caused by some other kind of error + // like, no permission, or exists but is not a directory + // but a file, dev, char, pipe whatever this thing + // supports anyway + free(incremental_dir_path); + free(dir_path); + return -3; + } + } + free(incremental_dir_path); + } + } + //printf("%d\n", len); + //printf("%s\n", dir_path); + //const char *pathname = dir_path; + //int ec = mkdir(pathname, 0777); + //return ec; + free(dir_path); + return 0; + } + else + { + return -2; + } +} + +sha512sum ak_fs_sha512sum_string_to_struct(char* string) +{ + sha512sum hash = {0}; + if ( ak_fs_verify_input_is_hash(string) ) + { + for (size_t l = 0; l < 8; ++l) + { + hash.sum[l]=0; + } + unsigned int i = 0; + unsigned int j = 0; + unsigned int k = 4; + while ( string[i] != '\0' ) + { + assert( i < 128 && "Length exceeded limit"); + if ( i % 16 == 0 ) j = i / 16; + switch (string[i]) + { + case 0x30: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0x0; + break; + case 0x31: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0x1; + break; + case 0x32: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0x2; + break; + case 0x33: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0x3; + break; + case 0x34: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0x4; + break; + case 0x35: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0x5; + break; + case 0x36: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0x6; + break; + case 0x37: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0x7; + break; + case 0x38: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0x8; + break; + case 0x39: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0x9; + break; + case 0x61: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0xa; + break; + case 0x62: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0xb; + break; + case 0x63: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0xc; + break; + case 0x64: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0xd; + break; + case 0x65: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0xe; + break; + case 0x66: + hash.sum[j] = hash.sum[j] << k; + hash.sum[j] += 0xf; + break; + default: + assert(0 && "Character out of range"); + } + i++; + } + if ( i != 128 ) + { + sha512sum hash0 = {0}; + return hash0; + } + return hash; + } + else + { + return hash; + } +} + +void ak_fs_sha512sum_struct_to_string(sha512sum hash, char* string) +{ + int counter = 0; + for (size_t i = 0; i < 8; ++i) + { + for (size_t j = 0; j < 16; ++j) + { + long unsigned first = hash.sum[i]/0xfffffffffffffff; + switch(first){ + case 0: + string[counter] = '0'; + break; + case 1: + string[counter] = '1'; + break; + case 2: + string[counter] = '2'; + break; + case 3: + string[counter] = '3'; + break; + case 4: + string[counter] = '4'; + break; + case 5: + string[counter] = '5'; + break; + case 6: + string[counter] = '6'; + break; + case 7: + string[counter] = '7'; + break; + case 8: + string[counter] = '8'; + break; + case 9: + string[counter] = '9'; + break; + case 0xa: + string[counter] = 'a'; + break; + case 0xb: + string[counter] = 'b'; + break; + case 0xc: + string[counter] = 'c'; + break; + case 0xd: + string[counter] = 'd'; + break; + case 0xe: + string[counter] = 'e'; + break; + case 0xf: + string[counter] = 'f'; + break; + default: + assert(0 && "Should be unreachable"); + } + counter++; + hash.sum[i] = hash.sum[i] << 4; + } + } + string[128] = '\0'; +} + +int ak_fs_open_map_v3(char* maphash) +{ + if ( ak_fs_verify_input_is_hash(maphash) ) + { + //FILE *fd; + //char *mapsdir = "/home/kaotisk/.arching-kaos/akfs/maps/"; + //strncat(mapsdir, maphash); + // printf("%s\n", mapsdir); + exit(1); + return 0; + } + else + { + return 1; + } +} + +int ak_fs_from_map_v3_to_file(akfs_map_v3 maphash) +{ + (void)maphash; + return 0; +} diff --git a/c_implementation/src/aklog.c b/c_implementation/src/aklog.c new file mode 100644 index 0000000..f6b04e8 --- /dev/null +++ b/c_implementation/src/aklog.c @@ -0,0 +1,287 @@ +#include +#include +#include +#include +#include +#include "libaklog.h" + +#define AK_DEBUG true +#define ARRAY_SIZE(arr) (sizeof(arr) / sizeof((arr)[0])) + +int ak_log_write_to_file(char* message) +{ + FILE *fp; + fp = fopen("/home/kaotisk/.arching-kaos/logs/log", "ab"); + if (!fp) + { + perror("fopen"); + return EXIT_FAILURE; + } + fwrite(message, strlen(message),1,fp); + fwrite("\n", strlen("\n"),1,fp); + fclose(fp); + return 0; +} + +void ak_log_print_log_line(char* line) +{ + if ( line ) + { + int i = 0; + int spaces_found = 0; + int last_space = -1; + long int l = 1000000000; + long int ts = 0; + struct tm *timeInfo; + char ts_string[16]; // %Y%Y%Y%Y%m%m%d%d_%H%H%M%M%S%S + while ( line[i] != '\0' ) + { + if ( line[i] == ' ' ) // && spaces_found < 4) + { + spaces_found++; + if (true) //( spaces_found < 4 ) + { + for ( int k = last_space+1; k < i; k++ ) + { + switch(spaces_found){ + case 1: + // TS + while (true) + { + if ( line[k] == ' ' ) + { + timeInfo = localtime(&ts); + strftime(ts_string, sizeof(ts_string), "%Y%m%d_%H%M%S", timeInfo); + printf("%s ", ts_string); + break; + } + else + { + switch(line[k]) + { + case '0': + ts = 0*l + ts; + break; + case '1': + ts = 1*l + ts; + break; + case '2': + ts = 2*l + ts; + break; + case '3': + ts = 3*l + ts; + break; + case '4': + ts = 4*l + ts; + break; + case '5': + ts = 5*l + ts; + break; + case '6': + ts = 6*l + ts; + break; + case '7': + ts = 7*l + ts; + break; + case '8': + ts = 8*l + ts; + break; + case '9': + ts = 9*l + ts; + break; + } + l = l/10; + } + k++; + } + break; + case 2: + // PROGRAM + printf("\033[1;32m"); + while (true) + { + if ( line[k] == ' ' ) + { + break; + } + else + { + printf("%c", line[k]); + } + k++; + } + break; + case 3: + // TYPE + printf("\033[0;00m \033[1;31m"); + while (true) + { + if ( line[k] == ' ' ) + { + break; + } + else + { + printf("%c", line[k]); + } + k++; + } + break; + case 4: + // MESSAGE + printf("\033[0;00m "); + while (true) + { + if ( line[k] == '\0' ) + { + printf("\n"); + break; + } + else + { + printf("%c", line[k]); + } + k++; + } + break; + } + } + last_space = i; + } + } + i++; + } + } +} + +void ak_log_follow() +{ + // tail -f $AK_LOGSFILE | while read -r p || [ -n "$p" ] + // do + // ak_log_print_log_line "$p" + // done +} + +void ak_log_grep(char* message) +{ + printf("ak_log_grep: not implemented\n"); + return; + exit(2); + if ( message ) + { + if ( strcmp(message, "-h") || strcmp(message, "--help") ) + { + // description(); + printf("Launch with no arguments and select from the menu that will appear\n"); + exit(1); + } + } + printf("The following scripts have entries in the log file.\n"); + printf("Select one of those by entering the number of it below and hit enter:\n"); + // select x in $(cat $AK_LOGSFILE | cut -d ' ' -f 2 | sort | uniq) + // do + // grep $x $AK_LOGSFILE | while read line + // do + // ak_log_print_log_line "$line" + // done + // break + // done +} + +void ak_log_rotate() +{ + // if [ -f $AK_LOGSFILE ] + // then + // tar cvfz $AK_ARCHIVESDIR/logs_$(date -u +%s).tar.gz $AK_WORKDIR/logs + // cat /dev/null > $AK_WORKDIR/logs + // fi + // if [ -f $AK_WORKDIR/akd.log ] + // then + // tar cvfz $AK_ARCHIVESDIR/akd-logs_$(date -u +%s).tar.gz $AK_WORKDIR/akd.log + // cat /dev/null > $AK_WORKDIR/akd.log + // fi + printf("ak_log_rotate: not implemented\n"); + return; + exit(2); +} + +void ak_log_message(const char* program, LogMessageType lmtype, char* message) +{ + time_t ts = time(NULL); + time(&ts); + char* some_string = {0}; + char* type = {0}; + if ( program != NULL ) + { + switch(lmtype) + { + case ERROR: + type = "ERROR"; + break; + case INFO: + type = "INFO"; + break; + case WARNING: + type = "WARNING"; + break; + case EXIT: + type = "EXIT"; + break; + case DEBUG: + type = "DEBUG"; + break; + default: + asprintf(&some_string, "%ld <%s> [ERROR] No message type\n", ts, program); + ak_log_write_to_file(some_string); + if ( AK_DEBUG ) ak_log_print_log_line(some_string); + exit(1); + } + if ( message != NULL ) + { + asprintf(&some_string, "%ld <%s> [%s] %s", ts, program, type, message); + ak_log_write_to_file(some_string); + if ( AK_DEBUG ) ak_log_print_log_line(some_string); + } + else + { + asprintf(&some_string, "%ld <%s> [ERROR] No message\n", ts, program); + ak_log_write_to_file(some_string); + if ( AK_DEBUG ) ak_log_print_log_line(some_string); + exit(1); + } + } + else + { + // echo "$TS" "<$(basename $0)>" "[ERROR]" "No arguments given" >> $AK_LOGSFILE + asprintf(&some_string, "%ld <%s> [ERROR] No arguments given\n", ts, program); + ak_log_write_to_file(some_string); + if ( AK_DEBUG ) ak_log_print_log_line(some_string); + exit(1); + } +} + +void ak_log_exit(const char* program, char* message) +{ + ak_log_message(program, EXIT, message); +} + +void ak_log_warning(const char* program, char* message) +{ + ak_log_message(program, WARNING, message); +} + +void ak_log_debug(const char* program, char* message) +{ + ak_log_message(program, DEBUG, message); +} + +void ak_log_error(const char* program, char* message) +{ + ak_log_message(program, ERROR, message); +} + +void ak_log_info(const char* program, char* message) +{ + ak_log_message(program, INFO, message); +} + diff --git a/c_implementation/src/aklogcatter.c b/c_implementation/src/aklogcatter.c new file mode 100644 index 0000000..016c6d3 --- /dev/null +++ b/c_implementation/src/aklogcatter.c @@ -0,0 +1,35 @@ +#include +#include +#include +#include + +int ak_logcatter() +{ + printf("Testing: %s\n", __func__); + FILE *fp; + fp = fopen("/home/kaotisk/.arching-kaos/logs", "r"); + if (!fp) + { + perror("fopen"); + return EXIT_FAILURE; + } + char buffer[1] = {0}; + char line[1024] = {0}; + unsigned int i = 0; + while ( fread(buffer, sizeof(char), sizeof(char), fp) ) + { + if ( buffer[0] == '\n' ) + { + line[i] = '\0'; + ak_log_print_log_line(line); + i = 0; + } + else + { + line[i] = buffer[0]; + i++; + } + } + fclose(fp); + return 0; +} diff --git a/c_implementation/src/aksettings.c b/c_implementation/src/aksettings.c new file mode 100644 index 0000000..1c8249c --- /dev/null +++ b/c_implementation/src/aksettings.c @@ -0,0 +1,118 @@ +#include +#include +#include +#include +#include + +#define MAX_SETTINGS 100 + +typedef struct { + char *key; + char *value; +} AKSetting; + +AKSetting settings[MAX_SETTINGS]; +int settings_count = 0; + +bool ak_settings_write_string(FILE *file, const char *str) { + size_t len = strlen(str) + 1; // Include null terminator + if (fwrite(&len, sizeof(size_t), 1, file) != 1) return false; + if (fwrite(str, sizeof(char), len, file) != len) return false; + return true; +} + +char *ak_settings_read_string(FILE *file) { + size_t len; + if (fread(&len, sizeof(size_t), 1, file) != 1) return NULL; + char *str = malloc(len); + if (!str) return NULL; + if (fread(str, sizeof(char), len, file) != len) { + free(str); + return NULL; + } + return str; +} + +void ak_settings_free_settings() { + for (int i = 0; i < settings_count; i++) { + free(settings[i].key); + free(settings[i].value); + } + settings_count = 0; +} + +int ak_settings_find_setting(const char *key) { + for (int i = 0; i < settings_count; i++) { + if (strcmp(settings[i].key, key) == 0) { + return i; + } + } + return -1; +} + +bool ak_settings_load_settings_binary() { + FILE *file = fopen("settings.bin", "rb"); + if (!file) return false; + if (fread(&settings_count, sizeof(int), 1, file) != 1) { + fclose(file); + return false; + } + for (int i = 0; i < settings_count; i++) { + settings[i].key = ak_settings_read_string(file); + settings[i].value = ak_settings_read_string(file); + if (!settings[i].key || !settings[i].value) { + ak_settings_free_settings(); + fclose(file); + return false; + } + } + fclose(file); + return true; +} + +bool ak_settings_save_settings_binary() { + FILE *file = fopen("settings.bin", "wb"); + if (!file) return false; + if (fwrite(&settings_count, sizeof(int), 1, file) != 1) { + fclose(file); + return false; + } + for (int i = 0; i < settings_count; i++) { + if (!ak_settings_write_string(file, settings[i].key)) { + fclose(file); + return false; + } + if (!ak_settings_write_string(file, settings[i].value)) { + fclose(file); + return false; + } + } + fclose(file); + return true; +} + +bool ak_settings_set_setting(const char *key, const char *value) { + int index = ak_settings_find_setting(key); + if (index == -1) { + if (settings_count >= MAX_SETTINGS) return false; + settings[settings_count].key = strdup(key); + settings[settings_count].value = strdup(value); + if (!settings[settings_count].key || !settings[settings_count].value) { + free(settings[settings_count].key); + free(settings[settings_count].value); + return false; + } + settings_count++; + } else { + char *new_value = strdup(value); + if (!new_value) return false; + free(settings[index].value); + settings[index].value = new_value; + } + return true; +} + +const char *ak_settings_get_setting(const char *key) { + int index = ak_settings_find_setting(key); + return (index == -1) ? NULL : settings[index].value; +} diff --git a/c_implementation/src/akutils.c b/c_implementation/src/akutils.c new file mode 100644 index 0000000..d58e0a3 --- /dev/null +++ b/c_implementation/src/akutils.c @@ -0,0 +1,8 @@ +#include +#include + +int ak_utils() +{ + printf("Testing: %s\n", __func__); + return 0; +} diff --git a/c_implementation/tests/test_akfs.c b/c_implementation/tests/test_akfs.c new file mode 100644 index 0000000..d2b5aec --- /dev/null +++ b/c_implementation/tests/test_akfs.c @@ -0,0 +1,213 @@ +#include +#include +#include +#include + +void correct_string_correct_length() +{ + printf("%s\t", __func__); + char queried_string[] = "921618bc6d9f8059437c5e0397b13f973ab7c7a7b81f0ca31b70bf448fd800a460b67efda0020088bc97bf7d9da97a9e2ce7b20d46e066462ec44cf60284f9a7"; + // printf("Hash given:\t%s\n", queried_string); + // printf("Is a hash: %s\n", ak_fs_verify_input_is_hash(queried_string) ? "true": "false"); + sha512sum resulted_hash = ak_fs_sha512sum_string_to_struct(queried_string); + char resulted_string[129] = {0}; + ak_fs_sha512sum_struct_to_string(resulted_hash, resulted_string); + // printf("Hash returned:\t%s\n", resulted_string); + if ( strcmp(queried_string, resulted_string) == 0 ) + { + printf("PASS!\n"); + } + else + { + printf("NO PASS :(\n"); + } +} + +void bad_string_correct_length() +{ + printf("%s\t", __func__); + char queried_string[] = "921618bc6d9f8059437c5e0397b13f973ab7c7a7b81f0ca31b70bf448fd800a460b67efda0020088bc97bf7d9da97a9e2ce7b20d46e066462ec44cf60284f9az"; + // printf("Hash given:\t%s\n", queried_string); + // printf("Is a hash: %s\n", ak_fs_verify_input_is_hash(queried_string) ? "true": "false"); + sha512sum resulted_hash = ak_fs_sha512sum_string_to_struct(queried_string); + char resulted_string[129] = {0}; + ak_fs_sha512sum_struct_to_string(resulted_hash, resulted_string); + // printf("Hash returned:\t%s\n", resulted_string); + if ( strcmp(queried_string, resulted_string) != 0 ) + { + printf("PASS!\n"); + } + else + { + printf("NO PASS :(\n"); + } +} + +void less_than_length() +{ + printf("%s\t", __func__); + char queried_string[] = "921618bc6d9f8059437c5e0397b13f973ab7c7a7b81f0ca31b70bf"; + // printf("Hash given:\t%s\n", queried_string); + // printf("Is a hash: %s\n", ak_fs_verify_input_is_hash(queried_string) ? "true": "false"); + sha512sum resulted_hash = ak_fs_sha512sum_string_to_struct(queried_string); + char resulted_string[129] = {0}; + ak_fs_sha512sum_struct_to_string(resulted_hash, resulted_string); + // printf("Hash returned:\t%s\n", resulted_string); + if ( strcmp(queried_string, resulted_string) != 0 ) + { + printf("\tPASS!\n"); + } + else + { + printf("\tNO PASS :(\n"); + } +} + +void more_than_length() +{ + printf("%s\t", __func__); + char queried_string[] = "921618bc6d9f8059437c5e0397b13f973ab7c7a7b81f0ca31b70bf448fd800a460b67efda0020088bc97bf7d9da97a9e2ce7b20d46e066462ec44cf60284f9a7aaa"; + // printf("Hash given:\t%s\n", queried_string); + // printf("Is a hash: %s\n", ak_fs_verify_input_is_hash(queried_string) ? "true": "false"); + sha512sum resulted_hash = ak_fs_sha512sum_string_to_struct(queried_string); + char resulted_string[129] = {0}; + ak_fs_sha512sum_struct_to_string(resulted_hash, resulted_string); + // printf("Hash returned:\t%s\n", resulted_string); + if ( strcmp(queried_string, resulted_string) != 0 ) + { + printf("\tPASS!\n"); + } + else + { + printf("\tNO PASS :(\n"); + } +} + +void string_is_empty() +{ + printf("%s\t", __func__); + char queried_string[128] = ""; + // printf("Hash given:\t%s\n", queried_string); + //printf("Is a hash: %s\n", ak_fs_verify_input_is_hash(queried_string) ? "true": "false"); + sha512sum resulted_hash = ak_fs_sha512sum_string_to_struct(queried_string); + char resulted_string[129] = {0}; + ak_fs_sha512sum_struct_to_string(resulted_hash, resulted_string); + // printf("Hash returned:\t%s\n", resulted_string); + if ( strcmp(queried_string, resulted_string) != 0 ) + { + printf("\t\tPASS!\n"); + } + else + { + printf("\t\tNO PASS :(\n"); + } +} + +void hash_path_test() +{ + printf("%s\t", __func__); + char queried_string[] = "921618bc6d9f8059437c5e0397b13f973ab7c7a7b81f0ca31b70bf448fd800a460b67efda0020088bc97bf7d9da97a9e2ce7b20d46e066462ec44cf60284f9a7"; + // printf("Hash given:\t%s\n", queried_string); + // printf("Is a hash: %s\n", ak_fs_verify_input_is_hash(queried_string) ? "true": "false"); + char* resulted_string = ak_fs_return_hash_path(queried_string); + // printf("Path returned:\t%s\n", resulted_string); + if ( strcmp(queried_string, resulted_string) != 0 ) + { + printf("\t\tPASS!\n"); + } + else + { + printf("\t\tNO PASS :(\n"); + } +} + +void hash_dir_test() +{ + printf("%s\t", __func__); + char queried_string[] = "921618bc6d9f8059437c5e0397b13f973ab7c7a7b81f0ca31b70bf448fd800a460b67efda0020088bc97bf7d9da97a9e2ce7b20d46e066462ec44cf60284f9a7"; + // printf("Hash given:\t%s\n", queried_string); + // printf("Is a hash: %s\n", ak_fs_verify_input_is_hash(queried_string) ? "true": "false"); + char* resulted_string = ak_fs_return_hash_dir(queried_string); + // printf("Path returned:\t%s\n", resulted_string); + if ( strcmp(queried_string, resulted_string) != 0 ) + { + printf("\t\tPASS!\n"); + } + else + { + printf("\t\tNO PASS :(\n"); + } +} + +void hash_save_to_file() +{ + printf("%s\t", __func__); + char queried_string[] = "921618bc6d9f8059437c5e0397b13f973ab7c7a7b81f0ca31b70bf448fd800a460b67efda0020088bc97bf7d9da97a9e2ce7b20d46e066462ec44cf60284f9a7"; + // printf("Hash given:\t%s\n", queried_string); + // printf("Is a hash: %s\n", ak_fs_verify_input_is_hash(queried_string) ? "true": "false"); + sha512sum resulted_hash = ak_fs_sha512sum_string_to_struct(queried_string); + FILE* fd = fopen("tmpfile", "wb"); + if ( fd == NULL ) + { + printf("Some error occured"); + exit(1); + } + fwrite(&resulted_hash, sizeof(sha512sum),1,fd); + fclose(fd); + sha512sum readone = {0}; + fd = fopen("tmpfile", "rb"); + if ( fd == NULL ) + { + printf("Some error occured"); + exit(1); + } + fread (&readone, sizeof(sha512sum),1,fd); + char resulted_string[129] = {0}; + ak_fs_sha512sum_struct_to_string(resulted_hash, resulted_string); + if ( strcmp(queried_string, resulted_string) == 0 ) + { + printf("\tPASS!\n"); + } + else + { + printf("\tNO PASS :(\n"); + } + fclose(fd); +} + +void test_map_opener() +{ + ak_fs_open_map_v3("28bde5fa7aacd8da0ec84b61cf3a69141686906c00f8cff904c9a0b12f5a4cf061da254feb188c32b711b2e1d6a3853d5ac3fb0bcd3564899bae55dd30470392"); +} + + +int main(void) +{ + // Correct one + correct_string_correct_length(); + + // Supposingly a bad string but in correct length + bad_string_correct_length(); + + // Less than must be length + less_than_length(); + + // More than must be length + more_than_length(); + + // Empty string + string_is_empty(); + + // Hash path + hash_path_test(); + + // Hash dir + hash_dir_test(); + + // Tempfile test read-write + hash_save_to_file(); + + // Map file opener + test_map_opener(); + return 0; +} diff --git a/c_implementation/tests/test_akfs_mkdir.c b/c_implementation/tests/test_akfs_mkdir.c new file mode 100644 index 0000000..9ac98d1 --- /dev/null +++ b/c_implementation/tests/test_akfs_mkdir.c @@ -0,0 +1,38 @@ +#include +#include + +void test_non_hash_string(){ + char *path = "tes"; + int ec = ak_fs_create_dir_for_hash(path); + printf("mkdir return code: %d\n", ec); + path = "tes/t"; + ec = ak_fs_create_dir_for_hash(path); + printf("mkdir return code: %d\n", ec); +} + +void test_hash_string(){ + char *path = "ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff"; + int ec = ak_fs_create_dir_for_hash(path); + printf("mkdir return code: %d\n", ec); +} + +void test_hash_string2(){ + char *path = "ee2ab0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff"; + int ec = ak_fs_create_dir_for_hash(path); + printf("mkdir return code: %d\n", ec); +} + +void test_hash_string3(){ + char *path = "ee2ab0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a800"; + int ec = ak_fs_create_dir_for_hash(path); + printf("mkdir return code: %d\n", ec); +} + +int main() +{ + test_non_hash_string(); + test_hash_string(); + test_hash_string2(); + test_hash_string3(); + return 0; +} diff --git a/c_implementation/tests/test_aklog.c b/c_implementation/tests/test_aklog.c new file mode 100644 index 0000000..7e3f6a3 --- /dev/null +++ b/c_implementation/tests/test_aklog.c @@ -0,0 +1,72 @@ +#include + +void test_message_output() +{ + ak_log_print_log_line("1731664790 [INFO] test message info"); +} + +void test_follow() +{ + ak_log_follow(); +} + +void test_grep() +{ + ak_log_grep("-h"); +} + +void test_rotate() +{ + ak_log_rotate(); +} + +void test_log_message() +{ + ak_log_message(__func__, DEBUG, "test message info"); +} + +void test_exit() +{ + ak_log_exit(__func__, "test message info"); +} + +void test_warning() +{ + ak_log_warning(__func__, "test message info"); +} + +void test_debug() +{ + ak_log_debug(__func__, "test message info"); +} + +void test_error() +{ + ak_log_error(__func__, "test message info"); +} + +void test_info() +{ + ak_log_info(__func__, "test message info"); +} + +void test_one_word() +{ + ak_log_info(__func__, "test"); +} + +int main (void) +{ + test_follow(); + test_message_output(); + test_info(); + test_exit(); + test_error(); + test_debug(); + test_warning(); + test_log_message(); + test_rotate(); + test_grep(); + test_one_word(); + return 0; +} diff --git a/c_implementation/tests/test_aklogcatter.c b/c_implementation/tests/test_aklogcatter.c new file mode 100644 index 0000000..0fd4219 --- /dev/null +++ b/c_implementation/tests/test_aklogcatter.c @@ -0,0 +1,7 @@ +#include + +int main() +{ + ak_logcatter(); + return 0; +} diff --git a/c_implementation/tests/test_aklogwrite.c b/c_implementation/tests/test_aklogwrite.c new file mode 100644 index 0000000..0fc5d5b --- /dev/null +++ b/c_implementation/tests/test_aklogwrite.c @@ -0,0 +1,16 @@ +#include + +void test_write() +{ + ak_log_info(__func__, "test message info"); + ak_log_warning(__func__, "test message warning"); + ak_log_error(__func__, "test message error"); + ak_log_debug(__func__, "test message debug"); +} + +int main (void) +{ + test_write(); + return 0; +} + diff --git a/c_implementation/tests/test_aksettings.c b/c_implementation/tests/test_aksettings.c new file mode 100644 index 0000000..c3bbe44 --- /dev/null +++ b/c_implementation/tests/test_aksettings.c @@ -0,0 +1,53 @@ +#include +#include +#include + +int test_ak_settings_read_write_example() +{ + printf("Testing: %s\n", __func__); + if (!ak_settings_load_settings_binary()) + { + ak_log_warning(__func__, "No existing settings or error loading.\n"); + } + ak_settings_set_setting("username", "john_doe"); + ak_settings_set_setting("theme", "dark"); + ak_settings_set_setting("volume", "75"); + ak_settings_set_setting("theme", "light"); + if (!ak_settings_save_settings_binary()) + { + printf("Error saving settings!\n"); + ak_settings_free_settings(); + return 1; + } + const char *theme = ak_settings_get_setting("theme"); + if (theme) + { + char *some_text; + asprintf(&some_text, "Current theme: %s\n", theme); + ak_log_info(__func__, some_text); + } + ak_settings_free_settings(); + return 0; +} + +int test_ak_settings() +{ + char *some_text; + if ( test_ak_settings_read_write_example() == 0 ) + { + asprintf(&some_text, "Passed test"); + ak_log_info(__func__, some_text); + return 0; + } + else + { + asprintf(&some_text, "Failed test"); + ak_log_error(__func__, some_text); + return 1; + } +} + +int main() +{ + return test_ak_settings(); +} diff --git a/c_implementation/tests/test_aksettings_read.c b/c_implementation/tests/test_aksettings_read.c new file mode 100644 index 0000000..ddef12f --- /dev/null +++ b/c_implementation/tests/test_aksettings_read.c @@ -0,0 +1,23 @@ +#include +#include +#include + +void test_ak_settings_from_file() +{ + printf("Testing: %s\n", __func__); + if (!ak_settings_load_settings_binary()) { + ak_log_warning(__func__, "No existing settings or error loading.\n"); + } + const char *theme = ak_settings_get_setting("theme"); + if (theme) { + printf("Current theme: %s\n", theme); + } + ak_settings_free_settings(); +} + + +int main() +{ + test_ak_settings_from_file(); + return 0; +} diff --git a/c_implementation/tests/test_akutils.c b/c_implementation/tests/test_akutils.c new file mode 100644 index 0000000..8619e97 --- /dev/null +++ b/c_implementation/tests/test_akutils.c @@ -0,0 +1,7 @@ +#include + +int main() +{ + ak_utils(); + return 0; +} diff --git a/c_implementation/tests/test_sha512_string.c b/c_implementation/tests/test_sha512_string.c new file mode 100644 index 0000000..e7b9d21 --- /dev/null +++ b/c_implementation/tests/test_sha512_string.c @@ -0,0 +1,70 @@ +#include +#include +#include + +//#include + +typedef struct { + long unsigned int sum[8]; +} sha512sum; + +void shifting_example() +{ + long unsigned int X = 0xf; + for ( long unsigned i = 0; i < 64; i=i+4 ) + { + printf("shift[%02lu]:\t%#018lx\n", i, X << i); + } +} + +void structed_sum() +{ + sha512sum struct_sample = { + .sum[0] = 0x921618bc6d9f8059, + .sum[1] = 0x437c5e0397b13f97, + .sum[2] = 0x3ab7c7a7b81f0ca3, + .sum[3] = 0x1b70bf448fd800a4, + .sum[4] = 0x60b67efda0020088, + .sum[5] = 0xbc97bf7d9da97a9e, + .sum[6] = 0x2ce7b20d46e06646, + .sum[7] = 0x2ec44cf60284f9a7 + }; + printf("stru:\t"); + for ( long unsigned i = 0; i < 8; ++i ) + { + printf("%lx", struct_sample.sum[i]); + } + printf("\n"); +} + +void long_unsigned_example() +{ + printf("hex:\t%#018lx\n",0xffffffffffffffff); +} + +void char_based_sum() +{ + char sum_sample[] = "921618bc6d9f8059437c5e0397b13f973ab7c7a7b81f0ca31b70bf448fd800a460b67efda0020088bc97bf7d9da97a9e2ce7b20d46e066462ec44cf60284f9a7"; +// printf("Size:\t%08lu\n",sizeof(sum_sample)); +// printf("String:\t%s\n",sum_sample); +// printf("Last:\t%c\n",sum_sample[sizeof(sum_sample)-2]); // Null byte + printf("Loop:\t"); // Null byte + for ( long unsigned i = 0; i < sizeof(sum_sample)-1; ++i ) + { + assert (( sum_sample[i] >= 0x30 ) && (( sum_sample[i] <= 0x39) || ( sum_sample[i] >= 0x60 )) && ( sum_sample[i] <= 0x66 )); + printf("%c", sum_sample[i]); +// printf(" 0x%x", sum_sample[i]); + } + printf("\n"); +} + +int main (void) +{ + char_based_sum(); + structed_sum(); + long_unsigned_example(); + shifting_example(); + + return 0; +} + diff --git a/src/akfs.c b/src/akfs.c deleted file mode 100644 index c79882a..0000000 --- a/src/akfs.c +++ /dev/null @@ -1,326 +0,0 @@ -#include -#include -#include -#include -#include -#include -#include - -char* ak_fs_return_hash_path(char* string) -{ - if ( ak_fs_verify_input_is_hash(string) ) - { - unsigned int i = 0; - char *result = malloc((128*2)+1); - while ( string[i] != '\0' ) - { - result[i*2] = string[i]; - if ( (i*2) + 1 <= 254 ) - { - result[(i*2)+1] = '/'; - } - else - { - result[(i*2)+1] = '\0'; - } - ++i; - } - return result; - } - else - { - return NULL; - } -} - -char* ak_fs_return_hash_dir(char* string) -{ - if ( ak_fs_verify_input_is_hash(string) ) - { - unsigned int i = 0; - char *result = malloc((128*2)+1); - while ( string[i] != '\0' ) - { - result[i*2] = string[i]; - if ( (i*2) + 1 <= 254-2 ) - { - result[(i*2)+1] = '/'; - } - else - { - result[(i*2)+1] = '\0'; - } - ++i; - } - return result; - } - else - { - return NULL; - } -} - -bool ak_fs_verify_input_is_hash(char* string) -{ - unsigned int i = 0; - while ( string[i] != '\0' ) - { - if ( - i < 128 && - !( - ( string[i] >= 0x30 ) && - (( string[i] <= 0x39) || ( string[i] >= 0x61 )) && - ( string[i] <= 0x66 ) - ) - ) - { - return false; - } - else { - i++; - } - } - if ( i > 128 ) - { - return false; - } - return true; -} - -int ak_fs_create_dir_for_hash(char* string) -{ - /* TODO - * Some aspects of this function - * 1. We need a "root" place to put our dirs into, this is not specified - * anywhere in this code but it is spartially specified in other files - * like lib/_ak_fs bash script and the rc/config file we currently source - * in $HOME/.bashrc - * 2. We might need to "lock" onto some version of glibc and be aware of - * other systems that do not use that one. - */ - if ( ak_fs_verify_input_is_hash(string) ) - { - char* dir_path = ak_fs_return_hash_dir(string); - // We will need to separate the string so we can create the path one - // directory at the time - int len = strlen(dir_path); - for ( int i = 0; i < len+1; ++i) - { - if ( dir_path[i] == '/' ) - { - //printf("%c\n", dir_path[i]); - //char* test = strndup(dir_path, i); - //printf("A: [i:%d] [c:%c] - %s\n", i, dir_path[i], test); - continue; - } - else - { - char* incremental_dir_path = strndup(dir_path, i+1); - // printf("B: [i:%d] [c:%c] - %s\n", i, dir_path[i], test); - struct stat sb; - if (stat(incremental_dir_path, &sb) == 0 && S_ISDIR(sb.st_mode)) - { - continue; - } - else - { - int return_code = mkdir(incremental_dir_path, 0777); - if ( return_code == 0 ) - { - continue; - } - else - { - // should be unreachable I guess since previous checks - // though it could be caused by some other kind of error - // like, no permission, or exists but is not a directory - // but a file, dev, char, pipe whatever this thing - // supports anyway - free(incremental_dir_path); - free(dir_path); - return -3; - } - } - free(incremental_dir_path); - } - } - //printf("%d\n", len); - //printf("%s\n", dir_path); - //const char *pathname = dir_path; - //int ec = mkdir(pathname, 0777); - //return ec; - free(dir_path); - return 0; - } - else - { - return -2; - } -} - -sha512sum ak_fs_sha512sum_string_to_struct(char* string) -{ - sha512sum hash = {0}; - if ( ak_fs_verify_input_is_hash(string) ) - { - for (size_t l = 0; l < 8; ++l) - { - hash.sum[l]=0; - } - unsigned int i = 0; - unsigned int j = 0; - unsigned int k = 4; - while ( string[i] != '\0' ) - { - assert( i < 128 && "Length exceeded limit"); - if ( i % 16 == 0 ) j = i / 16; - switch (string[i]) - { - case 0x30: - hash.sum[j] = hash.sum[j] << k; - hash.sum[j] += 0x0; - break; - case 0x31: - hash.sum[j] = hash.sum[j] << k; - hash.sum[j] += 0x1; - break; - case 0x32: - hash.sum[j] = hash.sum[j] << k; - hash.sum[j] += 0x2; - break; - case 0x33: - hash.sum[j] = hash.sum[j] << k; - hash.sum[j] += 0x3; - break; - case 0x34: - hash.sum[j] = hash.sum[j] << k; - hash.sum[j] += 0x4; - break; - case 0x35: - hash.sum[j] = hash.sum[j] << k; - hash.sum[j] += 0x5; - break; - case 0x36: - hash.sum[j] = hash.sum[j] << k; - hash.sum[j] += 0x6; - break; - case 0x37: - hash.sum[j] = hash.sum[j] << k; - hash.sum[j] += 0x7; - break; - case 0x38: - hash.sum[j] = hash.sum[j] << k; - hash.sum[j] += 0x8; - break; - case 0x39: - hash.sum[j] = hash.sum[j] << k; - hash.sum[j] += 0x9; - break; - case 0x61: - hash.sum[j] = h