83 lines
2.9 KiB
Rust
83 lines
2.9 KiB
Rust
use std::io::{Read, Write};
|
|
use std::net::TcpStream;
|
|
|
|
// Minimal RESP helpers
|
|
fn arr(parts: &[&str]) -> String {
|
|
let mut out = format!("*{}\r\n", parts.len());
|
|
for p in parts {
|
|
out.push_str(&format!("${}\r\n{}\r\n", p.len(), p));
|
|
}
|
|
out
|
|
}
|
|
fn read_reply(s: &mut TcpStream) -> String {
|
|
let mut buf = [0u8; 65536];
|
|
let n = s.read(&mut buf).unwrap();
|
|
String::from_utf8_lossy(&buf[..n]).to_string()
|
|
}
|
|
fn parse_two_bulk(reply: &str) -> Option<(String,String)> {
|
|
let mut lines = reply.split("\r\n");
|
|
if lines.next()? != "*2" { return None; }
|
|
let _n = lines.next()?;
|
|
let a = lines.next()?.to_string();
|
|
let _m = lines.next()?;
|
|
let b = lines.next()?.to_string();
|
|
Some((a,b))
|
|
}
|
|
fn parse_bulk(reply: &str) -> Option<String> {
|
|
let mut lines = reply.split("\r\n");
|
|
let hdr = lines.next()?;
|
|
if !hdr.starts_with('$') { return None; }
|
|
Some(lines.next()?.to_string())
|
|
}
|
|
fn parse_simple(reply: &str) -> Option<String> {
|
|
let mut lines = reply.split("\r\n");
|
|
let hdr = lines.next()?;
|
|
if !hdr.starts_with('+') { return None; }
|
|
Some(hdr[1..].to_string())
|
|
}
|
|
|
|
fn main() {
|
|
let mut args = std::env::args().skip(1);
|
|
let host = args.next().unwrap_or_else(|| "127.0.0.1".into());
|
|
let port = args.next().unwrap_or_else(|| "6379".into());
|
|
let addr = format!("{host}:{port}");
|
|
println!("Connecting to {addr}...");
|
|
let mut s = TcpStream::connect(addr).expect("connect");
|
|
|
|
// Generate & persist X25519 enc keys under name "alice"
|
|
s.write_all(arr(&["age","keygen","alice"]).as_bytes()).unwrap();
|
|
let (_alice_recip, _alice_ident) = parse_two_bulk(&read_reply(&mut s)).expect("gen enc");
|
|
|
|
// Generate & persist Ed25519 signing key under name "signer"
|
|
s.write_all(arr(&["age","signkeygen","signer"]).as_bytes()).unwrap();
|
|
let (_verify, _secret) = parse_two_bulk(&read_reply(&mut s)).expect("gen sign");
|
|
|
|
// Encrypt by name
|
|
let msg = "hello from persistent keys";
|
|
s.write_all(arr(&["age","encryptname","alice", msg]).as_bytes()).unwrap();
|
|
let ct_b64 = parse_bulk(&read_reply(&mut s)).expect("ct b64");
|
|
println!("ciphertext b64: {}", ct_b64);
|
|
|
|
// Decrypt by name
|
|
s.write_all(arr(&["age","decryptname","alice", &ct_b64]).as_bytes()).unwrap();
|
|
let pt = parse_bulk(&read_reply(&mut s)).expect("pt");
|
|
assert_eq!(pt, msg);
|
|
println!("decrypted ok");
|
|
|
|
// Sign by name
|
|
s.write_all(arr(&["age","signname","signer", msg]).as_bytes()).unwrap();
|
|
let sig_b64 = parse_bulk(&read_reply(&mut s)).expect("sig b64");
|
|
|
|
// Verify by name
|
|
s.write_all(arr(&["age","verifyname","signer", msg, &sig_b64]).as_bytes()).unwrap();
|
|
let ok = parse_simple(&read_reply(&mut s)).expect("verify");
|
|
assert_eq!(ok, "1");
|
|
println!("signature verified");
|
|
|
|
// List names
|
|
s.write_all(arr(&["age","list"]).as_bytes()).unwrap();
|
|
let list = read_reply(&mut s);
|
|
println!("LIST -> {list}");
|
|
|
|
println!("✔ persistent AGE workflow complete.");
|
|
} |