package codec import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "errors" "github.com/tal-tech/go-zero/core/logx" ) var ErrPaddingSize = errors.New("padding size error") type ecb struct { b cipher.Block blockSize int } func newECB(b cipher.Block) *ecb { return &ecb{ b: b, blockSize: b.BlockSize(), } } type ecbEncrypter ecb func NewECBEncrypter(b cipher.Block) cipher.BlockMode { return (*ecbEncrypter)(newECB(b)) } func (x *ecbEncrypter) BlockSize() int { return x.blockSize } // why we don't return error is because cipher.BlockMode doesn't allow this func (x *ecbEncrypter) CryptBlocks(dst, src []byte) { if len(src)%x.blockSize != 0 { logx.Error("crypto/cipher: input not full blocks") return } if len(dst) < len(src) { logx.Error("crypto/cipher: output smaller than input") return } for len(src) > 0 { x.b.Encrypt(dst, src[:x.blockSize]) src = src[x.blockSize:] dst = dst[x.blockSize:] } } type ecbDecrypter ecb func NewECBDecrypter(b cipher.Block) cipher.BlockMode { return (*ecbDecrypter)(newECB(b)) } func (x *ecbDecrypter) BlockSize() int { return x.blockSize } // why we don't return error is because cipher.BlockMode doesn't allow this func (x *ecbDecrypter) CryptBlocks(dst, src []byte) { if len(src)%x.blockSize != 0 { logx.Error("crypto/cipher: input not full blocks") return } if len(dst) < len(src) { logx.Error("crypto/cipher: output smaller than input") return } for len(src) > 0 { x.b.Decrypt(dst, src[:x.blockSize]) src = src[x.blockSize:] dst = dst[x.blockSize:] } } func EcbDecrypt(key, src []byte) ([]byte, error) { block, err := aes.NewCipher(key) if err != nil { logx.Errorf("Decrypt key error: % x", key) return nil, err } decrypter := NewECBDecrypter(block) decrypted := make([]byte, len(src)) decrypter.CryptBlocks(decrypted, src) return pkcs5Unpadding(decrypted, decrypter.BlockSize()) } func EcbDecryptBase64(key, src string) (string, error) { keyBytes, err := getKeyBytes(key) if err != nil { return "", err } encryptedBytes, err := base64.StdEncoding.DecodeString(src) if err != nil { return "", err } decryptedBytes, err := EcbDecrypt(keyBytes, encryptedBytes) if err != nil { return "", err } return base64.StdEncoding.EncodeToString(decryptedBytes), nil } func EcbEncrypt(key, src []byte) ([]byte, error) { block, err := aes.NewCipher(key) if err != nil { logx.Errorf("Encrypt key error: % x", key) return nil, err } padded := pkcs5Padding(src, block.BlockSize()) crypted := make([]byte, len(padded)) encrypter := NewECBEncrypter(block) encrypter.CryptBlocks(crypted, padded) return crypted, nil } func EcbEncryptBase64(key, src string) (string, error) { keyBytes, err := getKeyBytes(key) if err != nil { return "", err } srcBytes, err := base64.StdEncoding.DecodeString(src) if err != nil { return "", err } encryptedBytes, err := EcbEncrypt(keyBytes, srcBytes) if err != nil { return "", err } return base64.StdEncoding.EncodeToString(encryptedBytes), nil } func getKeyBytes(key string) ([]byte, error) { if len(key) <= 32 { return []byte(key), nil } keyBytes, err := base64.StdEncoding.DecodeString(key) if err != nil { return nil, err } return keyBytes, nil } func pkcs5Padding(ciphertext []byte, blockSize int) []byte { padding := blockSize - len(ciphertext)%blockSize padtext := bytes.Repeat([]byte{byte(padding)}, padding) return append(ciphertext, padtext...) } func pkcs5Unpadding(src []byte, blockSize int) ([]byte, error) { length := len(src) unpadding := int(src[length-1]) if unpadding >= length || unpadding > blockSize { return nil, ErrPaddingSize } return src[:length-unpadding], nil }