1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
|
package main
import (
"flag"
"fmt"
"io"
"log"
"net"
"os"
"time"
"snix.ir/rabaead"
"snix.ir/rabbitio"
)
func main() {
encFlag := flag.NewFlagSet("encrypt", flag.ExitOnError)
decFlag := flag.NewFlagSet("decrypt", flag.ExitOnError)
flag.Usage = flagUsage
if len(os.Args) < 2 {
flag.Usage()
os.Exit(1)
}
switch os.Args[1] {
case "server":
server(encFlag)
case "client":
client(decFlag)
default:
flag.Usage()
os.Exit(1)
}
}
func flagUsage() {
fmt.Printf(`usage of %v: commands <args...|help>
commands:
server <args...> encrypt files with rabbit poly1305 aead cipher
client <args...> decrypt files with rabbit poly1305 aead cipher
Copyright (c) 2022 snix.ir, All rights reserved.
Developed BY <Sina Ghaderi> sina@snix.ir
This work is licensed under the terms of GNU General Public license.
Github: github.com/sina-ghaderi and Source: git.snix.ir
`, os.Args[0])
}
func server(flagset *flag.FlagSet) {
plain := flagset.String("net", "127.0.0.1:7899", "network tcp listen address")
keyva := flagset.String("key", "", "rabbit key string, must be 16-byte len")
ivxva := flagset.String("ivx", "", "rabbit iv string, must be 8-byte or nothing")
flagset.Parse(os.Args[2:])
ivb := []byte(*ivxva)
if len(ivb) != rabbitio.IVXLen && len(ivb) != 0 {
log.Fatal(rabbitio.ErrInvalidIVX)
}
aead, err := rabaead.NewAEAD([]byte(*keyva))
if err != nil {
log.Fatal(err)
}
l, err := net.Listen("tcp", *plain)
if err != nil {
log.Fatal(err)
}
for {
conn, err := l.Accept()
if err != nil {
log.Print(err)
continue
}
writer, _ := rabaead.NewChunkWriter(conn, 16, aead, ivb, nil)
go handleServerConn(writer, conn)
}
}
func handleServerConn(w io.WriteCloser, conn net.Conn) {
defer conn.Close()
if _, err := w.Write([]byte(time.Now().String())); err != nil {
log.Print(err)
return
}
}
func client(flagset *flag.FlagSet) {
plain := flagset.String("net", "127.0.0.1:7899", "network tcp dial address")
keyva := flagset.String("key", "", "rabbit key string, must be 16-byte len")
ivxva := flagset.String("ivx", "", "rabbit iv string, must be 8-byte or nothing")
flagset.Parse(os.Args[2:])
ivb := []byte(*ivxva)
aead, err := rabaead.NewAEAD([]byte(*keyva))
if err != nil {
log.Fatal(err)
}
conn, err := net.Dial("tcp", *plain)
if err != nil {
log.Fatal(err)
}
defer conn.Close()
reader, err := rabaead.NewChunkReader(conn, 16, aead, ivb, nil)
if err != nil {
log.Fatal(err)
}
ntms := []byte{}
buff := make([]byte, 16)
for {
n, err := reader.Read(buff)
if err != nil {
if err == io.EOF {
ntms = append(ntms, buff[:n]...)
break
}
log.Fatal(err)
}
ntms = append(ntms, buff...)
}
log.Printf("server time: %v", string(ntms))
}
|