git.sophuwu.com > seks   
              0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
             /*
 * SEKS: Secrets Encrypted Kept Safe
 */
package main

import (
	"crypto/rand"
	"crypto/sha256"
	"fmt"
	"golang.org/x/crypto/nacl/secretbox"
	"seks/sopHex"
)

func ran() []byte {
	var b [32]byte
	_, err := rand.Reader.Read(b[:])
	if err != nil {
		panic(err)
	}
	return b[:]
}

func main() {
	// NaCl crypto_box symmetric encryption
	// Make a bbolt database
	// Add buckets for categories of secrets
	// User makes a password for each bucket

	passwd := []byte("TestPassword")

	salt := ran()
	hash := sha256.New()
	hash.Write(passwd)
	hash.Write(salt)

	var key [32]byte
	copy(key[:], hash.Sum(nil))

	var nonce = [24]byte(ran()[0:24])
	salt = append(salt[:], nonce[:]...)
	message := []byte("I like to eat apples and bananas. However, I do not like to eat oranges. Cars can drive!")
	encrypted := secretbox.Seal(nil, message, &nonce, &key)

	fmt.Println(sopHex.Marshall(encrypted))
	/*
		deNonce := [24]byte(encrypted[0:24])
		decrypted, boolEnlon := secretbox.Open(nil, encrypted[24:], &deNonce, &key)
		if boolEnlon != true {
			fmt.Println("OOPS")
			return
		}
		fmt.Println(string(decrypted))

	*/
}