| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | package util | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"crypto/aes" | 
					
						
							|  |  |  | 	"crypto/cipher" | 
					
						
							|  |  |  | 	"crypto/rand" | 
					
						
							| 
									
										
										
										
											2016-01-26 05:15:29 +08:00
										 |  |  | 	"crypto/sha256" | 
					
						
							| 
									
										
										
										
											2017-04-25 15:14:29 +08:00
										 |  |  | 	"errors" | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | 	"io" | 
					
						
							|  |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-26 05:15:29 +08:00
										 |  |  | const saltLength = 8 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-04-25 15:14:29 +08:00
										 |  |  | func Decrypt(payload []byte, secret string) ([]byte, error) { | 
					
						
							| 
									
										
										
										
											2016-01-26 05:15:29 +08:00
										 |  |  | 	salt := payload[:saltLength] | 
					
						
							|  |  |  | 	key := encryptionKeyToBytes(secret, string(salt)) | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	block, err := aes.NewCipher(key) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2017-04-25 15:14:29 +08:00
										 |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// The IV needs to be unique, but not secure. Therefore it's common to
 | 
					
						
							|  |  |  | 	// include it at the beginning of the ciphertext.
 | 
					
						
							|  |  |  | 	if len(payload) < aes.BlockSize { | 
					
						
							| 
									
										
										
										
											2017-04-25 15:14:29 +08:00
										 |  |  | 		return nil, errors.New("payload too short") | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-01-26 05:15:29 +08:00
										 |  |  | 	iv := payload[saltLength : saltLength+aes.BlockSize] | 
					
						
							|  |  |  | 	payload = payload[saltLength+aes.BlockSize:] | 
					
						
							| 
									
										
										
										
											2017-09-08 16:19:04 +08:00
										 |  |  | 	payloadDst := make([]byte, len(payload)) | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	stream := cipher.NewCFBDecrypter(block, iv) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// XORKeyStream can work in-place if the two arguments are the same.
 | 
					
						
							| 
									
										
										
										
											2017-09-08 16:19:04 +08:00
										 |  |  | 	stream.XORKeyStream(payloadDst, payload) | 
					
						
							|  |  |  | 	return payloadDst, nil | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-04-25 15:14:29 +08:00
										 |  |  | func Encrypt(payload []byte, secret string) ([]byte, error) { | 
					
						
							| 
									
										
										
										
											2016-01-26 05:15:29 +08:00
										 |  |  | 	salt := GetRandomString(saltLength) | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-26 05:15:29 +08:00
										 |  |  | 	key := encryptionKeyToBytes(secret, salt) | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | 	block, err := aes.NewCipher(key) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2017-04-25 15:14:29 +08:00
										 |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// The IV needs to be unique, but not secure. Therefore it's common to
 | 
					
						
							|  |  |  | 	// include it at the beginning of the ciphertext.
 | 
					
						
							| 
									
										
										
										
											2016-01-26 05:15:29 +08:00
										 |  |  | 	ciphertext := make([]byte, saltLength+aes.BlockSize+len(payload)) | 
					
						
							|  |  |  | 	copy(ciphertext[:saltLength], []byte(salt)) | 
					
						
							|  |  |  | 	iv := ciphertext[saltLength : saltLength+aes.BlockSize] | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | 	if _, err := io.ReadFull(rand.Reader, iv); err != nil { | 
					
						
							| 
									
										
										
										
											2017-04-25 15:14:29 +08:00
										 |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	stream := cipher.NewCFBEncrypter(block, iv) | 
					
						
							| 
									
										
										
										
											2016-01-26 05:15:29 +08:00
										 |  |  | 	stream.XORKeyStream(ciphertext[saltLength+aes.BlockSize:], payload) | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-04-25 15:14:29 +08:00
										 |  |  | 	return ciphertext, nil | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Key needs to be 32bytes
 | 
					
						
							| 
									
										
										
										
											2016-01-26 05:15:29 +08:00
										 |  |  | func encryptionKeyToBytes(secret, salt string) []byte { | 
					
						
							|  |  |  | 	return PBKDF2([]byte(secret), []byte(salt), 10000, 32, sha256.New) | 
					
						
							| 
									
										
										
										
											2016-01-23 03:15:39 +08:00
										 |  |  | } |