2018-01-06 15:30:56 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2018-01-12 07:01:39 +00:00
|
|
|
"flag"
|
2018-01-06 15:30:56 +00:00
|
|
|
"fmt"
|
2018-01-13 06:47:57 +00:00
|
|
|
"io"
|
|
|
|
"os"
|
2018-01-18 04:36:53 +00:00
|
|
|
"sync"
|
2018-01-06 20:26:08 +00:00
|
|
|
|
|
|
|
hkex "blitter.com/herradurakex"
|
2018-01-06 15:30:56 +00:00
|
|
|
)
|
|
|
|
|
2018-01-09 03:16:55 +00:00
|
|
|
// Demo of a simple client that dials up to a simple test server to
|
|
|
|
// send data.
|
2018-01-13 18:01:27 +00:00
|
|
|
//
|
|
|
|
// While conforming to the basic net.Conn interface HKex.Conn has extra
|
|
|
|
// capabilities designed to allow apps to define connection options,
|
|
|
|
// encryption/hmac settings and operations across the encrypted channel.
|
|
|
|
//
|
|
|
|
// Initial setup is the same as using plain net.Dial(), but one may
|
|
|
|
// specify extra extension tags (strings) to set the cipher and hmac
|
|
|
|
// setting desired; as well as the intended operation mode for the
|
|
|
|
// connection (app-specific, passed through to the server to use or
|
|
|
|
// ignore at its discretion).
|
2018-01-06 15:30:56 +00:00
|
|
|
func main() {
|
2018-01-18 04:36:53 +00:00
|
|
|
var wg sync.WaitGroup
|
|
|
|
|
2018-01-12 07:01:39 +00:00
|
|
|
var cAlg string
|
2018-01-13 06:13:01 +00:00
|
|
|
var hAlg string
|
2018-01-13 06:24:40 +00:00
|
|
|
var server string
|
2018-01-13 06:47:57 +00:00
|
|
|
|
2018-01-12 07:01:39 +00:00
|
|
|
flag.StringVar(&cAlg, "c", "C_AES_256", "cipher [\"C_AES_256\" | \"C_TWOFISH_128\" | \"C_BLOWFISH_64\"]")
|
2018-01-13 06:13:01 +00:00
|
|
|
flag.StringVar(&hAlg, "h", "H_SHA256", "hmac [\"H_SHA256\"]")
|
2018-01-13 06:24:40 +00:00
|
|
|
flag.StringVar(&server, "s", "localhost:2000", "server hostname/address[:port]")
|
2018-01-12 07:01:39 +00:00
|
|
|
flag.Parse()
|
|
|
|
|
2018-01-13 06:24:40 +00:00
|
|
|
conn, err := hkex.Dial("tcp", server, cAlg, hAlg)
|
2018-01-06 15:30:56 +00:00
|
|
|
if err != nil {
|
2018-01-08 06:05:14 +00:00
|
|
|
fmt.Println("Err!")
|
2018-01-13 06:47:57 +00:00
|
|
|
panic(err)
|
|
|
|
}
|
2018-01-18 04:36:53 +00:00
|
|
|
defer conn.Close()
|
|
|
|
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
// This will guarantee the side that closes first
|
|
|
|
// marks its direction's goroutine as finished.
|
|
|
|
// Whichever direction's goroutine finishes first
|
|
|
|
// will call wg.Done() once more explicitly to
|
|
|
|
// hang up on the other side so the client
|
|
|
|
// exits immediately on an EOF from either side.
|
|
|
|
defer wg.Done()
|
|
|
|
|
|
|
|
// io.Copy() expects EOF so this will
|
|
|
|
// exit with inerr == nil
|
|
|
|
_, inerr := io.Copy(os.Stdout, conn)
|
|
|
|
if inerr != nil {
|
|
|
|
if inerr.Error() != "EOF" {
|
|
|
|
fmt.Println(inerr)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fmt.Println("[Got Write EOF]")
|
|
|
|
wg.Done() // client hanging up, close server read goroutine
|
|
|
|
}()
|
|
|
|
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
|
|
|
|
// io.Copy() expects EOF so this will
|
|
|
|
// exit with outerr == nil
|
|
|
|
_, outerr := io.Copy(conn, os.Stdin)
|
|
|
|
if outerr != nil {
|
|
|
|
if outerr.Error() != "EOF" {
|
|
|
|
fmt.Println(outerr)
|
|
|
|
os.Exit(2)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fmt.Println("[Got Read EOF]")
|
|
|
|
wg.Done() // server hung up, close client write goroutine
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Wait until both stdin and stdout goroutines finish
|
|
|
|
wg.Wait()
|
2018-01-06 15:30:56 +00:00
|
|
|
}
|