Files
photok-recovery/main.go
2024-10-10 13:12:01 +03:00

102 lines
1.7 KiB
Go

package main
import (
"archive/zip"
"crypto/aes"
"crypto/cipher"
"crypto/sha256"
"flag"
"io"
"log"
"os"
"strings"
"sync"
)
func main() {
password := flag.String("password", "", "photok password")
backupFile := flag.String("file", "", "path to backup file")
numWorkers := flag.Int("worker", 10, "number of workers")
flag.Parse()
var wg sync.WaitGroup
jobs := make(chan *zip.File)
for i := 0; i < *numWorkers; i++ {
wg.Add(1)
go worker(*password, jobs, &wg)
}
r, err := zip.OpenReader(*backupFile)
if err != nil {
log.Fatal(err)
}
defer r.Close()
for _, f := range r.File {
if !strings.HasSuffix(f.Name, ".tn") && strings.HasSuffix(f.Name, ".photok") {
jobs <- f
}
}
close(jobs)
wg.Wait()
}
func worker(password string, jobs <-chan *zip.File, wg *sync.WaitGroup) {
defer wg.Done()
key := photokKey(password)
iv := photokIV(password)
block, err := aes.NewCipher(key)
if err != nil {
log.Fatal(err)
}
aesgcm, err := cipher.NewGCMWithNonceSize(block, 16)
if err != nil {
log.Fatal(err)
}
for file := range jobs {
reader, err := file.Open()
if err != nil {
log.Fatal(err)
}
ciphertext, err := io.ReadAll(reader)
if err != nil {
log.Fatal(err)
}
plaintext, err := aesgcm.Open(nil, iv, ciphertext, nil)
if err != nil {
log.Fatal(err)
}
if err := os.WriteFile(file.Name+".plaintext", plaintext, 0o644); err != nil {
log.Fatal(err)
}
}
}
func photokKey(password string) []byte {
h := sha256.New()
h.Write([]byte(password))
return h.Sum(nil)
}
func photokIV(password string) []byte {
iv := make([]byte, 16)
for i := 0; i < 16 && i < len(password); i++ {
iv[i] = password[i]
}
return iv
}