100 lines
2.2 KiB
Plaintext
100 lines
2.2 KiB
Plaintext
package securityUtil
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"errors"
|
|
)
|
|
|
|
var (
|
|
// ErrInvalidBlockSize indicates hash blocksize <= 0.
|
|
ErrInvalidBlockSize = errors.New("invalid blocksize")
|
|
|
|
// ErrInvalidPKCS7Data indicates bad input to PKCS7 pad or unpad.
|
|
ErrInvalidPKCS7Data = errors.New("invalid PKCS7 data (empty or not padded)")
|
|
|
|
// ErrInvalidPKCS7Padding indicates PKCS7 unpad fails to bad input.
|
|
ErrInvalidPKCS7Padding = errors.New("invalid padding on input")
|
|
)
|
|
|
|
// pkcs7Pad right-pads the given byte slice with 1 to n bytes, where
|
|
// n is the block size. The size of the result is x times n, where x
|
|
// is at least 1.
|
|
func pkcs7Pad(b []byte, blocksize int) ([]byte, error) {
|
|
if b == nil || len(b) == 0 {
|
|
return nil, ErrInvalidPKCS7Data
|
|
}
|
|
if blocksize <= 0 {
|
|
return nil, ErrInvalidBlockSize
|
|
}
|
|
n := blocksize - (len(b) % blocksize)
|
|
pb := make([]byte, len(b)+n)
|
|
copy(pb, b)
|
|
copy(pb[len(b):], bytes.Repeat([]byte{byte(n)}, n))
|
|
|
|
return pb, nil
|
|
}
|
|
|
|
// pkcs7Unpad validates and unpads data from the given bytes slice.
|
|
// The returned value will be 1 to n bytes smaller depending on the
|
|
// amount of padding, where n is the block size.
|
|
func pkcs7Unpad(b []byte, blocksize int) ([]byte, error) {
|
|
if b == nil || len(b) == 0 {
|
|
return nil, ErrInvalidPKCS7Data
|
|
}
|
|
if blocksize <= 0 {
|
|
return nil, ErrInvalidBlockSize
|
|
}
|
|
if len(b)%blocksize != 0 {
|
|
return nil, ErrInvalidPKCS7Padding
|
|
}
|
|
|
|
c := b[len(b)-1]
|
|
n := int(c)
|
|
if n == 0 || n > len(b) {
|
|
return nil, ErrInvalidPKCS7Padding
|
|
}
|
|
|
|
for i := 0; i < n; i++ {
|
|
if b[len(b)-n+i] != c {
|
|
return nil, ErrInvalidPKCS7Padding
|
|
}
|
|
}
|
|
|
|
return b[:len(b)-n], nil
|
|
}
|
|
|
|
func AESEncrypt_CBC_Pkcs7(src []byte, key []byte) ([]byte, error) {
|
|
block, err := aes.NewCipher(key)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
src, err = pkcs7Pad(src, block.BlockSize())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
blockmode := cipher.NewCBCEncrypter(block, key)
|
|
blockmode.CryptBlocks(src, src)
|
|
|
|
return src, nil
|
|
}
|
|
|
|
func AESDecrypt_CBC_Pkcs7(src []byte, key []byte) ([]byte, error) {
|
|
block, err := aes.NewCipher(key)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
blockmode := cipher.NewCBCDecrypter(block, key)
|
|
blockmode.CryptBlocks(src, src)
|
|
src, err = pkcs7Unpad(src, block.BlockSize())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return src, nil
|
|
}
|