psyfer/main.go

229 lines
4.8 KiB
Go
Raw Normal View History

2016-02-11 22:43:09 -08:00
package main
import (
"fmt"
"log"
"math/rand"
"os"
"time"
"s.mcquay.me/dm/psyfer/psyfer"
"github.com/spf13/cobra"
)
func init() {
rand.Seed(time.Now().UnixNano())
}
2016-02-11 22:43:09 -08:00
var key128 = psyfer.Block{
0x2b, 0x28, 0xab, 0x09,
0x7e, 0xae, 0xf7, 0xcf,
0x15, 0xd2, 0x15, 0x4f,
0x16, 0xa6, 0x88, 0x3c,
}
var key192 = psyfer.Block{
0x00, 0x04, 0x08, 0x0c, 0x10, 0x14,
0x01, 0x05, 0x09, 0x0d, 0x11, 0x15,
0x02, 0x06, 0x0a, 0x0e, 0x12, 0x16,
0x03, 0x07, 0x0b, 0x0f, 0x13, 0x17,
}
var key256 = psyfer.Block{
0x00, 0x04, 0x08, 0x0c, 0x10, 0x14, 0x18, 0x1c,
0x01, 0x05, 0x09, 0x0d, 0x11, 0x15, 0x19, 0x1d,
0x02, 0x06, 0x0a, 0x0e, 0x12, 0x16, 0x1a, 0x1e,
0x03, 0x07, 0x0b, 0x0f, 0x13, 0x17, 0x1b, 0x1f,
}
2016-02-11 22:43:09 -08:00
func main() {
var key string
var keysize int
var decrypt bool
var ascii bool
var trans = &cobra.Command{
Use: "trans mode",
Short: "transposition cipher",
Long: `perform transposition cipher`,
Run: func(cmd *cobra.Command, args []string) {
fmt.Println("missing input, see -h (--help) for more info")
},
}
2016-03-11 21:36:35 -08:00
var sub = &cobra.Command{
Use: "sub",
2016-03-11 21:36:35 -08:00
Short: "substitution cipher",
Long: `perform substitution cipher`,
Run: func(cmd *cobra.Command, args []string) {
if key == "" || len(args) < 1 {
fmt.Println("missing input, see -h (--help) for more info")
os.Exit(1)
}
psyfer.ReadConfig(key)
for _, arg := range args {
fmt.Println(psyfer.Substitution(arg))
}
2016-03-11 21:36:35 -08:00
},
}
var aes = &cobra.Command{
Use: "aes",
Short: "aes cipher",
Long: `perform aes cipher`,
Run: func(cmd *cobra.Command, args []string) {
if len(args) < 1 {
fmt.Println("missing input, see -h (--help) for more info")
os.Exit(1)
}
for _, arg := range args {
all := psyfer.BlockGen(arg)
if ascii {
switch keysize {
case 128:
fmt.Println(psyfer.ToString(all, 128, key128, decrypt))
case 192:
fmt.Println(psyfer.ToString(all, 192, key192, decrypt))
case 256:
fmt.Println(psyfer.ToString(all, 256, key256, decrypt))
default:
log.Fatal("keysize not valid")
}
} else {
switch keysize {
case 128:
fmt.Println(psyfer.ToHex(all, 128, key128, decrypt))
case 192:
fmt.Println(psyfer.ToHex(all, 192, key192, decrypt))
case 256:
fmt.Println(psyfer.ToHex(all, 256, key256, decrypt))
default:
log.Fatal("keysize not valid")
}
}
}
},
}
var vig = &cobra.Command{
Use: "vig mode -c [cipher] -k [key] -i [input]",
Short: "vignenere cipher",
Long: `perform vigenere cipher`,
Run: func(cmd *cobra.Command, args []string) {
fmt.Println("missing input, see -h (--help) for more info")
},
}
var random = &cobra.Command{
Use: "random",
Short: "randomly transpose",
Long: `randomly transposes input`,
Run: func(cmd *cobra.Command, args []string) {
if len(args) < 1 {
fmt.Println("Please provide an input string")
os.Exit(1)
}
for _, arg := range args {
fmt.Println(psyfer.TransposeRandom(arg))
}
},
}
var railfence = &cobra.Command{
Use: "railfence",
Short: "railfence transpose",
Long: `performs railfence transposition on input`,
Run: func(cmd *cobra.Command, args []string) {
if len(args) < 1 {
fmt.Println("Please provide an input string")
os.Exit(1)
}
for _, arg := range args {
if decrypt {
fmt.Println(psyfer.DeTransposeRailFence(arg))
} else {
fmt.Println(psyfer.TransposeRailFence(arg))
}
}
},
}
var split = &cobra.Command{
Use: "split",
Short: "split transpose",
Long: `performs split transposition on input`,
Run: func(cmd *cobra.Command, args []string) {
if len(args) < 1 {
fmt.Println("Please provide an input string")
os.Exit(1)
}
for _, arg := range args {
if decrypt {
fmt.Println(psyfer.DeTransposeSplit(arg))
} else {
fmt.Println(psyfer.TransposeSplit(arg))
}
}
},
}
var crack = &cobra.Command{
Use: "times [# times] [string to echo]",
Short: "Echo anything to the screen more times",
Long: `echo things multiple times back to the user by providing a count and a string.`,
Run: func(cmd *cobra.Command, args []string) {
fmt.Println("crack")
},
}
//transpose flags
split.Flags().BoolVarP(
&decrypt,
"decrypt",
"d",
false,
"decrypt",
)
railfence.Flags().BoolVarP(
&decrypt,
"decrypt",
"d",
false,
"decrypt",
)
//sub flags
sub.Flags().StringVarP(
&key,
"key",
"k",
"",
"file containing key",
)
//aes flags
aes.Flags().IntVarP(
&keysize,
"keysize",
"k",
0,
"keysize",
)
aes.Flags().BoolVarP(
&ascii,
"ascii",
"a",
false,
"display in ascii (may mess up terminal :) )",
)
aes.Flags().BoolVarP(
&decrypt,
"decrypt",
"d",
false,
"decrypt",
)
var rootCmd = &cobra.Command{Use: "app"}
rootCmd.AddCommand(sub, aes, trans, vig)
trans.AddCommand(random, railfence, split)
vig.AddCommand(crack)
rootCmd.Execute()
2016-02-11 22:43:09 -08:00
}