2018-03-07 15:36:24 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2018-03-08 10:24:33 +00:00
|
|
|
"flag"
|
2018-03-07 15:36:24 +00:00
|
|
|
"io"
|
|
|
|
"log"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
|
2018-03-08 10:24:33 +00:00
|
|
|
"git.trj.tw/root/go-pgp-tool/pgpcrypt"
|
2018-03-07 15:36:24 +00:00
|
|
|
"golang.org/x/crypto/openpgp"
|
2018-03-08 10:24:33 +00:00
|
|
|
|
|
|
|
"git.trj.tw/root/go-pgp-tool/libs"
|
|
|
|
"git.trj.tw/root/go-pgp-tool/tools"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
flags *libs.Flags
|
2018-03-07 15:36:24 +00:00
|
|
|
)
|
|
|
|
|
2018-03-08 10:24:33 +00:00
|
|
|
func init() {
|
|
|
|
flags = new(libs.Flags)
|
|
|
|
libs.RegFlag(flags)
|
|
|
|
flag.Parse()
|
|
|
|
}
|
|
|
|
|
2018-03-07 15:36:24 +00:00
|
|
|
// args [0] is this
|
|
|
|
func main() {
|
2018-03-08 10:24:33 +00:00
|
|
|
// check flags value
|
|
|
|
if !flags.Encrypt && !flags.Decrypt {
|
|
|
|
showUsage()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if flags.Decrypt && flags.Encrypt {
|
|
|
|
showUsage()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if len(flags.KeyFile) == 0 {
|
|
|
|
log.Fatal("please input KeyFile path")
|
|
|
|
}
|
|
|
|
if len(flags.SrcFile) == 0 {
|
|
|
|
log.Fatal("please input SrcFile path")
|
|
|
|
}
|
|
|
|
if len(flags.DstFile) == 0 {
|
|
|
|
log.Fatal("please input DstFile path")
|
2018-03-07 15:36:24 +00:00
|
|
|
}
|
|
|
|
|
2018-03-08 10:24:33 +00:00
|
|
|
// check file exists
|
|
|
|
if !tools.CheckExists(flags.KeyFile, false) {
|
|
|
|
log.Fatal("KeyFile not exists")
|
|
|
|
}
|
|
|
|
if !tools.CheckExists(flags.SrcFile, false) {
|
|
|
|
log.Fatal("SrcFile not exists")
|
|
|
|
}
|
|
|
|
dir := path.Dir(flags.DstFile)
|
|
|
|
if !tools.CheckExists(dir, true) {
|
|
|
|
log.Fatal("DstFile parent directory not exists")
|
|
|
|
}
|
|
|
|
if !flags.Override && tools.CheckExists(flags.DstFile, false) {
|
|
|
|
log.Fatal("DstFile has Exists if override add flag -y ")
|
|
|
|
}
|
|
|
|
|
|
|
|
// go to decrypt file
|
|
|
|
if flags.Decrypt {
|
|
|
|
decryptAction()
|
|
|
|
}
|
|
|
|
if flags.Encrypt {
|
|
|
|
// encryptAction()
|
|
|
|
encrypt()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func decryptAction() {
|
|
|
|
// open key file
|
|
|
|
keyFile, err := os.Open(flags.KeyFile)
|
|
|
|
handleError(err)
|
|
|
|
defer keyFile.Close()
|
|
|
|
|
|
|
|
keys, err := pgpcrypt.ReadKeyFile(keyFile)
|
|
|
|
handleError(err)
|
|
|
|
if len(keys) == 0 {
|
|
|
|
log.Fatal("key file not validate")
|
|
|
|
}
|
|
|
|
|
|
|
|
srcFile, err := os.Open(flags.SrcFile)
|
|
|
|
handleError(err)
|
|
|
|
|
|
|
|
var dstFile *os.File
|
|
|
|
if tools.CheckExists(flags.DstFile, false) {
|
|
|
|
dstFile, err = os.Open(flags.DstFile)
|
|
|
|
handleError(err)
|
|
|
|
defer dstFile.Close()
|
|
|
|
dstStat, err := dstFile.Stat()
|
|
|
|
handleError(err)
|
|
|
|
err = dstFile.Truncate(dstStat.Size())
|
|
|
|
handleError(err)
|
|
|
|
} else {
|
|
|
|
dstFile, err = os.Create(flags.DstFile)
|
|
|
|
handleError(err)
|
|
|
|
defer dstFile.Close()
|
2018-03-07 15:36:24 +00:00
|
|
|
}
|
|
|
|
|
2018-03-08 10:24:33 +00:00
|
|
|
key := keys[0]
|
|
|
|
err = pgpcrypt.Decrypt(key, flags.Password, srcFile, dstFile)
|
|
|
|
handleError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func encryptAction() {
|
|
|
|
// open key file
|
|
|
|
keyFile, err := os.Open(flags.KeyFile)
|
|
|
|
handleError(err)
|
|
|
|
defer keyFile.Close()
|
2018-03-07 15:36:24 +00:00
|
|
|
|
2018-03-08 10:24:33 +00:00
|
|
|
keys, err := pgpcrypt.ReadKeyFile(keyFile)
|
|
|
|
handleError(err)
|
|
|
|
if len(keys) == 0 {
|
|
|
|
log.Fatal("key file not validate")
|
2018-03-07 15:36:24 +00:00
|
|
|
}
|
|
|
|
|
2018-03-08 10:24:33 +00:00
|
|
|
srcFile, err := os.Open(flags.SrcFile)
|
|
|
|
handleError(err)
|
|
|
|
|
|
|
|
// encBytes, err := pgpcrypt.EncryptBytes(keys, srcFile)
|
|
|
|
// handleError(err)
|
|
|
|
|
|
|
|
// fmt.Println("bytes ::: ", len(encBytes))
|
|
|
|
|
|
|
|
// var dstFile *os.File
|
|
|
|
// if tools.CheckExists(flags.DstFile, false) {
|
|
|
|
// dstFile, err = os.Open(flags.DstFile)
|
|
|
|
// handleError(err)
|
|
|
|
// defer dstFile.Close()
|
|
|
|
// dstStat, err := dstFile.Stat()
|
|
|
|
// handleError(err)
|
|
|
|
// err = dstFile.Truncate(dstStat.Size())
|
|
|
|
// handleError(err)
|
|
|
|
// } else {
|
|
|
|
dstFile, err := os.Create(flags.DstFile)
|
|
|
|
handleError(err)
|
|
|
|
defer dstFile.Close()
|
|
|
|
// }
|
|
|
|
|
|
|
|
err = pgpcrypt.Encrypt(keys, srcFile, dstFile)
|
|
|
|
handleError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func handleError(err error) {
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
2018-03-07 15:36:24 +00:00
|
|
|
}
|
2018-03-08 10:24:33 +00:00
|
|
|
}
|
2018-03-07 15:36:24 +00:00
|
|
|
|
2018-03-08 10:24:33 +00:00
|
|
|
func showUsage() {
|
|
|
|
flag.Usage()
|
2018-03-07 15:36:24 +00:00
|
|
|
}
|
|
|
|
|
2018-03-08 10:24:33 +00:00
|
|
|
func encrypt() {
|
|
|
|
keyFile, err := os.Open(flags.KeyFile)
|
2018-03-07 15:36:24 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
defer keyFile.Close()
|
|
|
|
|
|
|
|
var keyList openpgp.EntityList
|
|
|
|
keys, err := openpgp.ReadArmoredKeyRing(keyFile)
|
|
|
|
// keys, err := openpgp.ReadKeyRing(keyFile)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
keyList = append(keyList, keys...)
|
|
|
|
|
2018-03-08 10:24:33 +00:00
|
|
|
distFile, err := os.Create(flags.DstFile)
|
2018-03-07 15:36:24 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
defer distFile.Close()
|
|
|
|
|
|
|
|
// distBuf := new(bytes.Buffer)
|
|
|
|
|
2018-03-08 10:24:33 +00:00
|
|
|
srcFile, err := os.Open(flags.SrcFile)
|
2018-03-07 15:36:24 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
defer srcFile.Close()
|
|
|
|
|
|
|
|
fhint := &openpgp.FileHints{}
|
|
|
|
fhint.IsBinary = true
|
|
|
|
|
|
|
|
tmpWriter, err := openpgp.Encrypt(distFile, keyList, nil, fhint, nil)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
defer tmpWriter.Close()
|
|
|
|
|
|
|
|
_, err = io.Copy(tmpWriter, srcFile)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|