Commit graph

23 commits

Author SHA1 Message Date
Sudhi Herle
d274ff5380 Added debug flag and temporary debug logs for encrypt/decrypt path. 2022-06-15 13:56:37 -07:00
Sudhi Herle
42bbe5ddeb Refactored the core signing & encryption library, teach sigtool to use safe I/O.
* Added new SafeFile (io.WriteCloser) class + methods to atomically write a file.
* Teach core lib to use SafeFile for all file I/O
* Teach sigtool to use SafeFile for all file I/O
* Cleaned up the public interfaces of sign/ to be more coherent:
   - with uniform APIs for marshaling, unmarshaling, serialization.
   - removed KeyPair class/interface and stick to PrivateKey as the primary
     interface.
* collected common rand utility functions into rand.go
* Teach sigtool to NOT overwrite existing output files (keys, signatures etc.)
* Teach sigtool to use a new --overwrite option for every command that creates
  files (generate, sign, encrypt, decrypt)
* encrypt/decrypt will try to use the input file mode/perm where possible
  (unless input is stdin).
* Added more tests
2022-04-29 21:36:39 +05:30
Sudhi Herle
445c13ca6f Closes #5 and #6
- removed spurious check in decrypt() against blocksize
- added additional tests for small sized blocks and inputs smaller than
  the blocksize.
- updated README to capture dependencies (protobuf tools)
2022-04-27 08:54:44 +05:30
Sudhi Herle
bce89dacb0 Updated to go1.18; minor code cleanups; updated dependencies 2022-03-20 20:15:15 -07:00
Sudhi Herle
81a6522ee7 Fixed bug in makeNonceV2(): use the full salt and use block# as prefix
Updated go.mod to use go-1.17
2021-08-28 20:19:24 -07:00
Sudhi Herle
945046a815 v2 of sigtool with some changes:
- aead nonce construction is efficient (replace last 8 bytes of salt
  with encoded block# and chunk-size
- increase aead nonce size to 32 bytes
- refactor errors into a separate file
- update "build" to latest version
- updated README.
2021-05-15 19:35:54 -07:00
Sudhi Herle
3fa0ce0c9c Make encryption a bit more efficient
* don't copy chunksize but encode in-place
* reduce stack allocation of chunksize+seq buffer and reuse output
  buffer
2020-03-24 11:39:04 -07:00
Sudhi Herle
e22fae05f7 Better handling of sender verification
* Sender identity is never shared in the encrypted payload
* Sender signs the data-encryption key via Ed25519 if sender-auth is
  desired; else a "signature" of all zeroes is used. In either case, this
  signature is encrypted with the same data-encryption key.
* cleaned up stale code and updated tests
2020-03-23 10:44:40 -07:00
Sudhi Herle
00542dec02 Major breaking changes: Reworked file encryption scheme
* all encryption now uses ephmeral curve25519 keys
* sender can identify themselves by providing a signing key
* sign/verify now uses a string prefix for calculating checksum of the
  incoming message + known prefix [prevents us from verifying unknown
  blobs]
* encrypt/decrypt key is now expanded with a known prefix _and_ the
  header checksum
* protobuf definition changed to include an encrypted sender
  identification blob (sender public key)
* moved protobuf files into an internal/pb directory
* general code rearrangement to make it easy to find files
* added extra validation for reading all keys
* bumped version to 1.0.0
2020-03-20 17:40:52 -07:00
Sudhi Herle
1cd3a94180 Added new io.Reader and io.WriteCloser interface to Decryption and Encryption respectively.
* added test case for streaming read/write
* bumped version#
2020-02-14 18:47:25 -08:00
Sudhi Herle
088f1e9ca2 simplified error handling in Encrypt() 2020-02-02 21:32:16 +05:30
Sudhi Herle
8ed3bff6db Cleaned up chunk header encoding during encrypt/decrypt.
* encrypted chunk header now encodes _only_ plain text length
* the AEAD tag length is implicitly added when reading/writing
* added better sanity checks for short blocks during decrypt
* io.ReadAtLeast() reports ErrUnexpectedEOF for less than a full chunk;
  use this signal correctly
* major version bump to denote header incompatibility
2020-01-29 16:47:14 +05:30
Sudhi Herle
0ba5c8b599 don't die if blksize is too large; clamp it to max allowed. 2020-01-23 12:24:27 +05:30
Sudhi Herle
fbfcd37679 Removed deprecated functions in curve25519
* Replaced ScalarMult()/ScalarBaseMult() with X25519()
* version# bump
2020-01-09 15:19:17 -08:00
Sudhi Herle
f32525a864 THIS IS A BREAKING CHANGE! Private Keys generated by previous versions won't work with this version.
* Refactored the private key protection to use standard AEAD
  construction.
* Fix sanity check of decrypted block length to stay within verified
  bounds
* Cleanup test harness to split into utility file (assert()); cleaned up
  names of test functions.
* Fixed scrypt params to not take too long (N=2^19)
* Updated README with these changes
2020-01-08 09:17:54 -08:00
Sudhi Herle
262a554356 Minor refactoring: header checksum now covers _all_ of the header 2019-12-31 11:39:25 -08:00
Sudhi Herle
a9c17988c4 Teach sigtool to mark the last block (eof). 2019-11-07 11:57:01 +01:00
Sudhi Herle
b14f9d1e53 Merge branch 'encdec' 2019-10-22 20:12:51 -07:00
Sudhi Herle
a347fdca79 Teach 'sigtool enc' to accept a user defined block size 2019-10-21 13:28:27 -07:00
Sudhi Herle
387c75e791 Ran gofmt on all files; forgot to do that after merging. 2019-10-19 21:12:57 -05:00
Sudhi Herle
a27044154a Working version with enc/dec of all key types.
* Updated README
* fix non-ephemeral key wrap/unwrap
* fix out of bounds error in decrypt
2019-10-18 15:42:08 -07:00
Sudhi Herle
21445ba1a1 First working version of encrypt/decrypt
* use protobuf for encryption-header
* use fixed size file-header (42 bytes) before the encryption-header
* add encryption/decryption contexts
* teach MakePrivateKey() to fixup its internal public key bits
2019-10-17 14:29:01 -07:00
Sudhi Herle
1cc55e1a55 WIP: added encryption key mgmt
* added encrypt, decrypt commands (empty now)
* use command abbreviation util library
* switched to go1.13 (ed25519 now in stdlib)
* added new code to convert/manage Ed25519 keys to Curve25519
  (thanks to FiloSottile/age)
2019-10-09 14:52:34 -07:00