aes.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183
  1. package encrypt
  2. import (
  3. "bytes"
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "crypto/rand"
  7. "io"
  8. )
  9. /*CBC加密 按照golang标准库的例子代码
  10. 不过里面没有填充的部分,所以补上
  11. */
  12. //使用PKCS7进行填充,IOS也是7
  13. func PKCS7Padding(ciphertext []byte, blockSize int) []byte {
  14. padding := blockSize - len(ciphertext)%blockSize
  15. padtext := bytes.Repeat([]byte{byte(padding)}, padding)
  16. return append(ciphertext, padtext...)
  17. }
  18. func PKCS7UnPadding(origData []byte) []byte {
  19. length := len(origData)
  20. unpadding := int(origData[length-1])
  21. return origData[:(length - unpadding)]
  22. }
  23. //aes加密,填充秘钥key的16位,24,32分别对应AES-128, AES-192, or AES-256.
  24. func AesCBCEncrypt(rawData, key []byte) ([]byte, error) {
  25. block, err := aes.NewCipher(key)
  26. if err != nil {
  27. panic(err)
  28. }
  29. //填充原文
  30. blockSize := block.BlockSize()
  31. rawData = PKCS7Padding(rawData, blockSize)
  32. //初始向量IV必须是唯一,但不需要保密
  33. cipherText := make([]byte, blockSize+len(rawData))
  34. //block大小 16
  35. iv := cipherText[:blockSize]
  36. if _, err := io.ReadFull(rand.Reader, iv); err != nil {
  37. panic(err)
  38. }
  39. //block大小和初始向量大小一定要一致
  40. mode := cipher.NewCBCEncrypter(block, iv)
  41. mode.CryptBlocks(cipherText[blockSize:], rawData)
  42. return cipherText, nil
  43. }
  44. func AesCBCPKCS7Encrypt(rawData, key []byte, iv []byte) ([]byte, error) {
  45. block, err := aes.NewCipher(key)
  46. if err != nil {
  47. panic(err)
  48. }
  49. //填充原文
  50. blockSize := block.BlockSize()
  51. rawData = PKCS7Padding(rawData, blockSize)
  52. //初始向量IV必须是唯一,但不需要保密
  53. cipherText := make([]byte, blockSize+len(rawData))
  54. //block大小 16
  55. if _, err := io.ReadFull(rand.Reader, iv); err != nil {
  56. panic(err)
  57. }
  58. //block大小和初始向量大小一定要一致
  59. mode := cipher.NewCBCEncrypter(block, iv[:blockSize])
  60. mode.CryptBlocks(cipherText, rawData)
  61. return cipherText, nil
  62. }
  63. func AesCBCEncryptWithIv(rawData, key, iv []byte) ([]byte, error) {
  64. block, err := aes.NewCipher(key)
  65. if err != nil {
  66. return nil, err
  67. }
  68. blockSize := block.BlockSize()
  69. rawData = PKCS5Padding(rawData, blockSize)
  70. blockMode := cipher.NewCBCEncrypter(block, iv[:blockSize])
  71. crypted := make([]byte, len(rawData))
  72. blockMode.CryptBlocks(crypted, rawData)
  73. return crypted, nil
  74. }
  75. func AesCBCDecrypt(encryptData, iv, key []byte) ([]byte, error) {
  76. block, err := aes.NewCipher(key)
  77. if err != nil {
  78. panic(err)
  79. }
  80. blockSize := block.BlockSize()
  81. if len(encryptData) < blockSize {
  82. panic("ciphertext too short")
  83. }
  84. // CBC mode always works in whole blocks.
  85. if len(encryptData)%blockSize != 0 {
  86. panic("ciphertext is not a multiple of the block size")
  87. }
  88. mode := cipher.NewCBCDecrypter(block, iv)
  89. // CryptBlocks can work in-place if the two arguments are the same.
  90. mode.CryptBlocks(encryptData, encryptData)
  91. //解填充
  92. encryptData = PKCS7Padding(encryptData, blockSize)
  93. return encryptData, nil
  94. }
  95. func AesCBCDecryptNoIV(encryptData, key []byte) ([]byte, error) {
  96. block, err := aes.NewCipher(key)
  97. if err != nil {
  98. panic(err)
  99. }
  100. blockSize := block.BlockSize()
  101. iv := encryptData[0:blockSize]
  102. encryptData = encryptData[blockSize:]
  103. if len(encryptData) < blockSize {
  104. panic("ciphertext too short")
  105. }
  106. // CBC mode always works in whole blocks.
  107. if len(encryptData)%blockSize != 0 {
  108. panic("ciphertext is not a multiple of the block size")
  109. }
  110. mode := cipher.NewCBCDecrypter(block, iv)
  111. // CryptBlocks can work in-place if the two arguments are the same.
  112. mode.CryptBlocks(encryptData, encryptData)
  113. //解填充
  114. encryptData = PKCS7Padding(encryptData, blockSize)
  115. return encryptData, nil
  116. }
  117. func AesCBCDecryptPKCS5Padding(encryptData, key, iv []byte) ([]byte, error) {
  118. block, err := aes.NewCipher(key)
  119. if err != nil {
  120. panic(err)
  121. }
  122. blockSize := block.BlockSize()
  123. if len(encryptData) < blockSize {
  124. panic("ciphertext too short")
  125. }
  126. // CBC mode always works in whole blocks.
  127. if len(encryptData)%blockSize != 0 {
  128. panic("ciphertext is not a multiple of the block size")
  129. }
  130. mode := cipher.NewCBCDecrypter(block, iv)
  131. // CryptBlocks can work in-place if the two arguments are the same.
  132. mode.CryptBlocks(encryptData, encryptData)
  133. //解填充
  134. encryptData = PKCS5UnPadding(encryptData)
  135. return encryptData, nil
  136. }
  137. func PKCS5Padding(ciphertext []byte, blockSize int) []byte {
  138. padding := blockSize - len(ciphertext)%blockSize
  139. padtext := bytes.Repeat([]byte{byte(padding)}, padding)
  140. return append(ciphertext, padtext...)
  141. }
  142. func PKCS5UnPadding(origData []byte) []byte {
  143. length := len(origData)
  144. // 去掉最后一个字节 unpadding 次
  145. unpadding := int(origData[length-1])
  146. return origData[:(length - unpadding)]
  147. }