you can encrypt and decrypt big notes now

now it uses aes encryption
but we rsa encrypt the aes key
master
Jordan Orelli 10 years ago
parent e501295e61
commit 55b7dc58b8

@ -3,6 +3,8 @@ package main
import ( import (
"bufio" "bufio"
"code.google.com/p/go.crypto/ssh/terminal" "code.google.com/p/go.crypto/ssh/terminal"
"crypto/aes"
"crypto/cipher"
"crypto/rand" "crypto/rand"
"crypto/rsa" "crypto/rsa"
"encoding/json" "encoding/json"
@ -101,20 +103,38 @@ func (c *Client) handleMeta(body json.RawMessage) error {
} }
func (c *Client) handleNote(body json.RawMessage) error { func (c *Client) handleNote(body json.RawMessage) error {
var ctxt []byte c.info("unmarshaling note...")
if err := json.Unmarshal(body, &ctxt); err != nil { var enote EncryptedNote
return fmt.Errorf("unable to read note response: %v", err) if err := json.Unmarshal(body, &enote); err != nil {
return fmt.Errorf("unable to unmarshal encrypted note: %v", err)
} }
ptxt, err := rsa.DecryptPKCS1v15(rand.Reader, c.key, ctxt)
c.info("aes key ciphertext: %x", enote.Key)
key, err := rsa.DecryptPKCS1v15(rand.Reader, c.key, enote.Key)
if err != nil {
return fmt.Errorf("unable to decrypt aes key from note: %v", err)
}
c.info("aes key: %x", key)
block, err := aes.NewCipher(key)
if err != nil { if err != nil {
return fmt.Errorf("unable to decrypt note response: %v", err) return fmt.Errorf("unable to create aes cipher: %v", err)
} }
var note NoteData
iv := enote.Body[:aes.BlockSize]
c.info("aes iv: %x", iv)
ptxt := make([]byte, len(enote.Body)-aes.BlockSize)
mode := cipher.NewCBCDecrypter(block, iv)
mode.CryptBlocks(ptxt, enote.Body[aes.BlockSize:])
c.info("ptxt: %s", ptxt)
var note Note
if err := json.Unmarshal(ptxt, &note); err != nil { if err := json.Unmarshal(ptxt, &note); err != nil {
return fmt.Errorf("unable to unmarshal note response: %v", err) return fmt.Errorf("unable to unmarshal ptxt note: %v", err)
} }
c.info("title: %s", note.Title) c.info("title: %s", note.Title)
c.info("body: %s", string(note.Body)) c.info("body: %s", note.Body)
return nil return nil
} }
@ -125,7 +145,19 @@ func (c *Client) handshake() error {
} }
func (c *Client) sendRequest(r request) error { func (c *Client) sendRequest(r request) error {
return writeRequest(c.conn, r) e, err := wrapRequest(r)
if err != nil {
return err
}
b, err := json.Marshal(e)
if err != nil {
return err
}
c.info("sending json request: %s", b)
if _, err := c.conn.Write(b); err != nil {
return err
}
return nil
} }
func (c *Client) info(template string, args ...interface{}) { func (c *Client) info(template string, args ...interface{}) {
@ -264,20 +296,64 @@ func (c *Client) getNote(args []string) {
} }
} }
func (c *Client) encryptNote(title string, note []rune) (NoteRequest, error) { func (c *Client) encryptNote(title string, message []rune) (*EncryptedNote, error) {
obj := &NoteData{ c.info("encrypting note...")
note := &Note{
Title: title, Title: title,
Body: []byte(string(note)), // lol, nooo, stahp Body: []byte(string(message)),
} }
b, err := json.Marshal(obj)
c.info("marshalling into json")
ptxt, err := json.Marshal(note)
if err != nil { if err != nil {
return nil, fmt.Errorf("unable to marshal note: %v", err) return nil, fmt.Errorf("couldn't marshal note to json: %v", err)
} }
ctxt, err := rsa.EncryptPKCS1v15(rand.Reader, &c.key.PublicKey, b) c.info("json text: %s", string(ptxt))
if len(ptxt)%aes.BlockSize != 0 {
pad := aes.BlockSize - len(ptxt)%aes.BlockSize
// this is shitty. There's a better way to do this, right?
for i := 0; i < pad; i++ {
ptxt = append(ptxt, ' ')
}
}
c.info("generating random aes key")
key, err := randslice(aes.BlockSize)
if err != nil {
return nil, fmt.Errorf("couldn't encrypt note: failed to make aes key bytes: %v", err)
}
c.info("aes key: %x", key)
block, err := aes.NewCipher(key)
if err != nil {
return nil, fmt.Errorf("couldn't encrypt note: failed to make aes cipher: %v", err)
}
c.info("generating aes iv")
ctxt := make([]byte, aes.BlockSize+len(ptxt))
iv := ctxt[:aes.BlockSize]
if _, err := io.ReadFull(rand.Reader, iv); err != nil {
return nil, fmt.Errorf("couldn't encrypt note: failed to make aes iv: %v", err)
}
c.info("aes iv: %x", iv)
mode := cipher.NewCBCEncrypter(block, iv)
mode.CryptBlocks(ctxt[aes.BlockSize:], ptxt)
c.info("aes ciphertext: %x", ctxt)
c.info("rsa encrypting aes key...")
ckey, err := rsa.EncryptPKCS1v15(rand.Reader, &c.key.PublicKey, key)
if err != nil { if err != nil {
return nil, fmt.Errorf("unable to encrypt note: %v", err) return nil, fmt.Errorf("couldn't encrypt note: failed to rsa encrypt aes key: %v", err)
} }
return ctxt, nil c.info("ckey: %x", ckey)
return &EncryptedNote{
Key: ckey,
Body: ctxt,
}, nil
} }
func (c *Client) readTextBlock() ([]rune, error) { func (c *Client) readTextBlock() ([]rune, error) {

@ -1,12 +1,8 @@
package main package main
import () import (
"crypto/rand"
type NoteRequest []byte )
func (n NoteRequest) Kind() string {
return "note"
}
type GetNoteRequest int type GetNoteRequest int
@ -14,7 +10,25 @@ func (g GetNoteRequest) Kind() string {
return "get-note" return "get-note"
} }
type NoteData struct { type Note struct {
Title string Title string
Body []byte Body []byte
} }
type EncryptedNote struct {
Key []byte
Body []byte
}
func (n EncryptedNote) Kind() string {
return "note"
}
func randslice(n int) ([]byte, error) {
b := make([]byte, n)
_, err := rand.Read(b)
if err != nil {
return nil, err
}
return b, nil
}

@ -16,6 +16,17 @@ type request interface {
Kind() string Kind() string
} }
func wrapRequest(r request) (*Envelope, error) {
b, err := json.Marshal(r)
if err != nil {
return nil, fmt.Errorf("unable to wrap request: %v", err)
}
return &Envelope{
Kind: r.Kind(),
Body: b,
}, nil
}
func writeRequest(w io.Writer, r request) error { func writeRequest(w io.Writer, r request) error {
b, err := json.Marshal(r) b, err := json.Marshal(r)
if err != nil { if err != nil {

@ -80,11 +80,6 @@ func (s *serverConnection) handleNoteRequest(body json.RawMessage) error {
it := s.db.NewIterator(r, nil) it := s.db.NewIterator(r, nil)
defer it.Release() defer it.Release()
var ctxt []byte
if err := json.Unmarshal(body, &ctxt); err != nil {
return fmt.Errorf("unable to unmarshal ciphertext: %v", err)
}
id := 0 id := 0
if it.Last() { if it.Last() {
k := it.Key() k := it.Key()
@ -96,7 +91,7 @@ func (s *serverConnection) handleNoteRequest(body json.RawMessage) error {
id = lastId + 1 id = lastId + 1
} }
key := fmt.Sprintf("notes/%d", id) key := fmt.Sprintf("notes/%d", id)
if err := s.db.Put([]byte(key), ctxt, nil); err != nil { if err := s.db.Put([]byte(key), body, nil); err != nil {
return fmt.Errorf("unable to write note to db: %v", err) return fmt.Errorf("unable to write note to db: %v", err)
} }
info_log.Printf("stored new note at %s", key) info_log.Printf("stored new note at %s", key)
@ -113,7 +108,11 @@ func (s *serverConnection) handleGetNoteRequest(body json.RawMessage) error {
if err != nil { if err != nil {
return fmt.Errorf("couldn't retrieve note: %v", err) return fmt.Errorf("couldn't retrieve note: %v", err)
} }
if err := s.sendRequest(NoteRequest(b)); err != nil { raw, err := json.Marshal(&Envelope{Kind: "note", Body: b})
if err != nil {
return fmt.Errorf("couldn't send note back to client: %v", err)
}
if _, err := s.conn.Write(raw); err != nil {
return fmt.Errorf("couldn't send note back to client: %v", err) return fmt.Errorf("couldn't send note back to client: %v", err)
} }
return nil return nil

Loading…
Cancel
Save