mirror of
https://gogs.blitter.com/RLabs/xs
synced 2024-08-14 10:26:42 +00:00
5493921e9f
-Note about blowfish iv len (lack of) bounds check in .NewOFB(); -TODO added to enforce keymat from HKex >= 2*chosen cipher blocksize (assuming keylen == blocksize -- might not be true for all future algs)
33 lines
880 B
Go
33 lines
880 B
Go
package main
|
|
|
|
import (
|
|
"flag"
|
|
"fmt"
|
|
|
|
hkex "blitter.com/herradurakex"
|
|
)
|
|
|
|
// Demo of a simple client that dials up to a simple test server to
|
|
// send data.
|
|
// Note this code is identical to standard tcp client code, save for
|
|
// declaring a 'hkex' rather than a 'net' Dialer Conn. The KEx and
|
|
// encrypt/decrypt is done within the type.
|
|
// Compare to 'clientp.go' in this directory to see the equivalence.
|
|
func main() {
|
|
var cAlg string
|
|
|
|
flag.StringVar(&cAlg, "c", "C_AES_256", "cipher [\"C_AES_256\" | \"C_TWOFISH_128\" | \"C_BLOWFISH_64\"]")
|
|
flag.Parse()
|
|
|
|
conn, err := hkex.Dial("tcp", "localhost:2000", cAlg)
|
|
if err != nil {
|
|
// handle error
|
|
fmt.Println("Err!")
|
|
}
|
|
fmt.Fprintf(conn, "\x01\x02\x03\x04")
|
|
//fmt.Fprintf(conn, "GET / HTTP/1.0\r\n\r\n")
|
|
//status, err := bufio.NewReader(conn).ReadString('\n')
|
|
//_, err = bufio.NewReader(conn).ReadString('\n')
|
|
// ...
|
|
|
|
}
|