goProject/trunk/goutil/securityUtil/aes.go
皮蛋13361098506 1b77f62820 初始化项目
2025-01-06 16:01:02 +08:00

100 lines
2.2 KiB
Go

package securityUtil
import (
"bytes"
"crypto/aes"
"crypto/cipher"
"errors"
)
var (
// ErrInvalidBlockSize indicates hash blocksize <= 0.
ErrInvalidBlockSize = errors.New("invalid blocksize")
// ErrInvalidPKCS7Data indicates bad input to PKCS7 pad or unpad.
ErrInvalidPKCS7Data = errors.New("invalid PKCS7 data (empty or not padded)")
// ErrInvalidPKCS7Padding indicates PKCS7 unpad fails to bad input.
ErrInvalidPKCS7Padding = errors.New("invalid padding on input")
)
// pkcs7Pad right-pads the given byte slice with 1 to n bytes, where
// n is the block size. The size of the result is x times n, where x
// is at least 1.
func pkcs7Pad(b []byte, blocksize int) ([]byte, error) {
if b == nil || len(b) == 0 {
return nil, ErrInvalidPKCS7Data
}
if blocksize <= 0 {
return nil, ErrInvalidBlockSize
}
n := blocksize - (len(b) % blocksize)
pb := make([]byte, len(b)+n)
copy(pb, b)
copy(pb[len(b):], bytes.Repeat([]byte{byte(n)}, n))
return pb, nil
}
// pkcs7Unpad validates and unpads data from the given bytes slice.
// The returned value will be 1 to n bytes smaller depending on the
// amount of padding, where n is the block size.
func pkcs7Unpad(b []byte, blocksize int) ([]byte, error) {
if b == nil || len(b) == 0 {
return nil, ErrInvalidPKCS7Data
}
if blocksize <= 0 {
return nil, ErrInvalidBlockSize
}
if len(b)%blocksize != 0 {
return nil, ErrInvalidPKCS7Padding
}
c := b[len(b)-1]
n := int(c)
if n == 0 || n > len(b) {
return nil, ErrInvalidPKCS7Padding
}
for i := 0; i < n; i++ {
if b[len(b)-n+i] != c {
return nil, ErrInvalidPKCS7Padding
}
}
return b[:len(b)-n], nil
}
func AESEncrypt_CBC_Pkcs7(src []byte, key []byte) ([]byte, error) {
block, err := aes.NewCipher(key)
if err != nil {
return nil, err
}
src, err = pkcs7Pad(src, block.BlockSize())
if err != nil {
return nil, err
}
blockmode := cipher.NewCBCEncrypter(block, key)
blockmode.CryptBlocks(src, src)
return src, nil
}
func AESDecrypt_CBC_Pkcs7(src []byte, key []byte) ([]byte, error) {
block, err := aes.NewCipher(key)
if err != nil {
return nil, err
}
blockmode := cipher.NewCBCDecrypter(block, key)
blockmode.CryptBlocks(src, src)
src, err = pkcs7Unpad(src, block.BlockSize())
if err != nil {
return nil, err
}
return src, nil
}