|
|
|
package codec
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto/aes"
|
|
|
|
"crypto/cipher"
|
|
|
|
"encoding/base64"
|
|
|
|
"errors"
|
|
|
|
|
|
|
|
"github.com/tal-tech/go-zero/core/logx"
|
|
|
|
)
|
|
|
|
|
|
|
|
var ErrPaddingSize = errors.New("padding size error")
|
|
|
|
|
|
|
|
type ecb struct {
|
|
|
|
b cipher.Block
|
|
|
|
blockSize int
|
|
|
|
}
|
|
|
|
|
|
|
|
func newECB(b cipher.Block) *ecb {
|
|
|
|
return &ecb{
|
|
|
|
b: b,
|
|
|
|
blockSize: b.BlockSize(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type ecbEncrypter ecb
|
|
|
|
|
|
|
|
func NewECBEncrypter(b cipher.Block) cipher.BlockMode {
|
|
|
|
return (*ecbEncrypter)(newECB(b))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (x *ecbEncrypter) BlockSize() int { return x.blockSize }
|
|
|
|
|
|
|
|
// why we don't return error is because cipher.BlockMode doesn't allow this
|
|
|
|
func (x *ecbEncrypter) CryptBlocks(dst, src []byte) {
|
|
|
|
if len(src)%x.blockSize != 0 {
|
|
|
|
logx.Error("crypto/cipher: input not full blocks")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if len(dst) < len(src) {
|
|
|
|
logx.Error("crypto/cipher: output smaller than input")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for len(src) > 0 {
|
|
|
|
x.b.Encrypt(dst, src[:x.blockSize])
|
|
|
|
src = src[x.blockSize:]
|
|
|
|
dst = dst[x.blockSize:]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type ecbDecrypter ecb
|
|
|
|
|
|
|
|
func NewECBDecrypter(b cipher.Block) cipher.BlockMode {
|
|
|
|
return (*ecbDecrypter)(newECB(b))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (x *ecbDecrypter) BlockSize() int {
|
|
|
|
return x.blockSize
|
|
|
|
}
|
|
|
|
|
|
|
|
// why we don't return error is because cipher.BlockMode doesn't allow this
|
|
|
|
func (x *ecbDecrypter) CryptBlocks(dst, src []byte) {
|
|
|
|
if len(src)%x.blockSize != 0 {
|
|
|
|
logx.Error("crypto/cipher: input not full blocks")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if len(dst) < len(src) {
|
|
|
|
logx.Error("crypto/cipher: output smaller than input")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for len(src) > 0 {
|
|
|
|
x.b.Decrypt(dst, src[:x.blockSize])
|
|
|
|
src = src[x.blockSize:]
|
|
|
|
dst = dst[x.blockSize:]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func EcbDecrypt(key, src []byte) ([]byte, error) {
|
|
|
|
block, err := aes.NewCipher(key)
|
|
|
|
if err != nil {
|
|
|
|
logx.Errorf("Decrypt key error: % x", key)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
decrypter := NewECBDecrypter(block)
|
|
|
|
decrypted := make([]byte, len(src))
|
|
|
|
decrypter.CryptBlocks(decrypted, src)
|
|
|
|
|
|
|
|
return pkcs5Unpadding(decrypted, decrypter.BlockSize())
|
|
|
|
}
|
|
|
|
|
|
|
|
func EcbDecryptBase64(key, src string) (string, error) {
|
|
|
|
keyBytes, err := getKeyBytes(key)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
encryptedBytes, err := base64.StdEncoding.DecodeString(src)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
decryptedBytes, err := EcbDecrypt(keyBytes, encryptedBytes)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return base64.StdEncoding.EncodeToString(decryptedBytes), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func EcbEncrypt(key, src []byte) ([]byte, error) {
|
|
|
|
block, err := aes.NewCipher(key)
|
|
|
|
if err != nil {
|
|
|
|
logx.Errorf("Encrypt key error: % x", key)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
padded := pkcs5Padding(src, block.BlockSize())
|
|
|
|
crypted := make([]byte, len(padded))
|
|
|
|
encrypter := NewECBEncrypter(block)
|
|
|
|
encrypter.CryptBlocks(crypted, padded)
|
|
|
|
|
|
|
|
return crypted, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func EcbEncryptBase64(key, src string) (string, error) {
|
|
|
|
keyBytes, err := getKeyBytes(key)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
srcBytes, err := base64.StdEncoding.DecodeString(src)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
encryptedBytes, err := EcbEncrypt(keyBytes, srcBytes)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return base64.StdEncoding.EncodeToString(encryptedBytes), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func getKeyBytes(key string) ([]byte, error) {
|
|
|
|
if len(key) <= 32 {
|
|
|
|
return []byte(key), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if keyBytes, err := base64.StdEncoding.DecodeString(key); err != nil {
|
|
|
|
return nil, err
|
|
|
|
} else {
|
|
|
|
return keyBytes, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func pkcs5Padding(ciphertext []byte, blockSize int) []byte {
|
|
|
|
padding := blockSize - len(ciphertext)%blockSize
|
|
|
|
padtext := bytes.Repeat([]byte{byte(padding)}, padding)
|
|
|
|
return append(ciphertext, padtext...)
|
|
|
|
}
|
|
|
|
|
|
|
|
func pkcs5Unpadding(src []byte, blockSize int) ([]byte, error) {
|
|
|
|
length := len(src)
|
|
|
|
unpadding := int(src[length-1])
|
|
|
|
if unpadding >= length || unpadding > blockSize {
|
|
|
|
return nil, ErrPaddingSize
|
|
|
|
}
|
|
|
|
|
|
|
|
return src[:length-unpadding], nil
|
|
|
|
}
|