2016-01-22 13:15:39 -06:00
|
|
|
package util
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/aes"
|
|
|
|
"crypto/cipher"
|
|
|
|
"crypto/rand"
|
2016-01-25 15:15:29 -06:00
|
|
|
"crypto/sha256"
|
2017-04-25 02:14:29 -05:00
|
|
|
"errors"
|
2016-01-22 13:15:39 -06:00
|
|
|
"io"
|
|
|
|
)
|
|
|
|
|
2016-01-25 15:15:29 -06:00
|
|
|
const saltLength = 8
|
|
|
|
|
2019-01-28 15:09:40 -06:00
|
|
|
// Decrypt decrypts a payload with a given secret.
|
2017-04-25 02:14:29 -05:00
|
|
|
func Decrypt(payload []byte, secret string) ([]byte, error) {
|
2016-01-25 15:15:29 -06:00
|
|
|
salt := payload[:saltLength]
|
|
|
|
key := encryptionKeyToBytes(secret, string(salt))
|
2016-01-22 13:15:39 -06:00
|
|
|
|
|
|
|
block, err := aes.NewCipher(key)
|
|
|
|
if err != nil {
|
2017-04-25 02:14:29 -05:00
|
|
|
return nil, err
|
2016-01-22 13:15:39 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// The IV needs to be unique, but not secure. Therefore it's common to
|
|
|
|
// include it at the beginning of the ciphertext.
|
|
|
|
if len(payload) < aes.BlockSize {
|
2017-04-25 02:14:29 -05:00
|
|
|
return nil, errors.New("payload too short")
|
2016-01-22 13:15:39 -06:00
|
|
|
}
|
2016-01-25 15:15:29 -06:00
|
|
|
iv := payload[saltLength : saltLength+aes.BlockSize]
|
|
|
|
payload = payload[saltLength+aes.BlockSize:]
|
2017-09-08 03:19:04 -05:00
|
|
|
payloadDst := make([]byte, len(payload))
|
2016-01-22 13:15:39 -06:00
|
|
|
|
|
|
|
stream := cipher.NewCFBDecrypter(block, iv)
|
|
|
|
|
|
|
|
// XORKeyStream can work in-place if the two arguments are the same.
|
2017-09-08 03:19:04 -05:00
|
|
|
stream.XORKeyStream(payloadDst, payload)
|
|
|
|
return payloadDst, nil
|
2016-01-22 13:15:39 -06:00
|
|
|
}
|
|
|
|
|
2019-01-28 15:09:40 -06:00
|
|
|
// Encrypt encrypts a payload with a given secret.
|
2017-04-25 02:14:29 -05:00
|
|
|
func Encrypt(payload []byte, secret string) ([]byte, error) {
|
2016-01-25 15:15:29 -06:00
|
|
|
salt := GetRandomString(saltLength)
|
2016-01-22 13:15:39 -06:00
|
|
|
|
2016-01-25 15:15:29 -06:00
|
|
|
key := encryptionKeyToBytes(secret, salt)
|
2016-01-22 13:15:39 -06:00
|
|
|
block, err := aes.NewCipher(key)
|
|
|
|
if err != nil {
|
2017-04-25 02:14:29 -05:00
|
|
|
return nil, err
|
2016-01-22 13:15:39 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// The IV needs to be unique, but not secure. Therefore it's common to
|
|
|
|
// include it at the beginning of the ciphertext.
|
2016-01-25 15:15:29 -06:00
|
|
|
ciphertext := make([]byte, saltLength+aes.BlockSize+len(payload))
|
|
|
|
copy(ciphertext[:saltLength], []byte(salt))
|
|
|
|
iv := ciphertext[saltLength : saltLength+aes.BlockSize]
|
2016-01-22 13:15:39 -06:00
|
|
|
if _, err := io.ReadFull(rand.Reader, iv); err != nil {
|
2017-04-25 02:14:29 -05:00
|
|
|
return nil, err
|
2016-01-22 13:15:39 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
stream := cipher.NewCFBEncrypter(block, iv)
|
2016-01-25 15:15:29 -06:00
|
|
|
stream.XORKeyStream(ciphertext[saltLength+aes.BlockSize:], payload)
|
2016-01-22 13:15:39 -06:00
|
|
|
|
2017-04-25 02:14:29 -05:00
|
|
|
return ciphertext, nil
|
2016-01-22 13:15:39 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Key needs to be 32bytes
|
2016-01-25 15:15:29 -06:00
|
|
|
func encryptionKeyToBytes(secret, salt string) []byte {
|
|
|
|
return PBKDF2([]byte(secret), []byte(salt), 10000, 32, sha256.New)
|
2016-01-22 13:15:39 -06:00
|
|
|
}
|