2019-02-21 11:28:13 -08:00
|
|
|
/*
|
|
|
|
CBC describes a block cipher mode. In cryptography, a block cipher mode of operation is an algorithm that uses a
|
|
|
|
block cipher to provide an information service such as confidentiality or authenticity. A block cipher by itself
|
|
|
|
is only suitable for the secure cryptographic transformation (encryption or decryption) of one fixed-length group of
|
|
|
|
bits called a block. A mode of operation describes how to repeatedly apply a cipher's single-block operation to
|
|
|
|
securely transform amounts of data larger than a block.
|
|
|
|
|
|
|
|
This package simplifies the usage of AES-256-CBC.
|
|
|
|
*/
|
2022-01-30 15:27:37 -08:00
|
|
|
package cbcutil
|
2019-02-21 11:28:13 -08:00
|
|
|
|
|
|
|
/*
|
|
|
|
Some code is provided by the GitHub user locked (github.com/locked):
|
|
|
|
https://gist.github.com/locked/b066aa1ddeb2b28e855e
|
|
|
|
Thanks!
|
|
|
|
*/
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto/aes"
|
|
|
|
"crypto/cipher"
|
2024-08-27 10:04:05 -07:00
|
|
|
"crypto/hmac"
|
2019-02-21 11:28:13 -08:00
|
|
|
"crypto/rand"
|
2024-08-27 10:04:05 -07:00
|
|
|
"crypto/sha256"
|
|
|
|
"errors"
|
2019-02-21 11:28:13 -08:00
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
)
|
|
|
|
|
|
|
|
/*
|
|
|
|
Decrypt is a function that decrypts a given cipher text with a provided key and initialization vector(iv).
|
|
|
|
*/
|
|
|
|
func Decrypt(key, iv, ciphertext []byte) ([]byte, error) {
|
|
|
|
block, err := aes.NewCipher(key)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(ciphertext) < aes.BlockSize {
|
|
|
|
return nil, fmt.Errorf("ciphertext is shorter then block size: %d / %d", len(ciphertext), aes.BlockSize)
|
|
|
|
}
|
|
|
|
|
|
|
|
if iv == nil {
|
|
|
|
iv = ciphertext[:aes.BlockSize]
|
|
|
|
ciphertext = ciphertext[aes.BlockSize:]
|
|
|
|
}
|
|
|
|
|
|
|
|
cbc := cipher.NewCBCDecrypter(block, iv)
|
|
|
|
cbc.CryptBlocks(ciphertext, ciphertext)
|
|
|
|
|
|
|
|
return unpad(ciphertext)
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
Encrypt is a function that encrypts plaintext with a given key and an optional initialization vector(iv).
|
|
|
|
*/
|
|
|
|
func Encrypt(key, iv, plaintext []byte) ([]byte, error) {
|
|
|
|
plaintext = pad(plaintext, aes.BlockSize)
|
|
|
|
|
|
|
|
if len(plaintext)%aes.BlockSize != 0 {
|
|
|
|
return nil, fmt.Errorf("plaintext is not a multiple of the block size: %d / %d", len(plaintext), aes.BlockSize)
|
|
|
|
}
|
|
|
|
|
|
|
|
block, err := aes.NewCipher(key)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
var ciphertext []byte
|
|
|
|
if iv == nil {
|
|
|
|
ciphertext = make([]byte, aes.BlockSize+len(plaintext))
|
|
|
|
iv := ciphertext[:aes.BlockSize]
|
|
|
|
if _, err := io.ReadFull(rand.Reader, iv); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
cbc := cipher.NewCBCEncrypter(block, iv)
|
|
|
|
cbc.CryptBlocks(ciphertext[aes.BlockSize:], plaintext)
|
|
|
|
} else {
|
|
|
|
ciphertext = make([]byte, len(plaintext))
|
|
|
|
|
|
|
|
cbc := cipher.NewCBCEncrypter(block, iv)
|
|
|
|
cbc.CryptBlocks(ciphertext, plaintext)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ciphertext, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func pad(ciphertext []byte, blockSize int) []byte {
|
|
|
|
padding := blockSize - len(ciphertext)%blockSize
|
|
|
|
padtext := bytes.Repeat([]byte{byte(padding)}, padding)
|
|
|
|
return append(ciphertext, padtext...)
|
|
|
|
}
|
|
|
|
|
|
|
|
func unpad(src []byte) ([]byte, error) {
|
|
|
|
length := len(src)
|
|
|
|
padLen := int(src[length-1])
|
|
|
|
|
|
|
|
if padLen > length {
|
|
|
|
return nil, fmt.Errorf("padding is greater then the length: %d / %d", padLen, length)
|
|
|
|
}
|
|
|
|
|
|
|
|
return src[:(length - padLen)], nil
|
|
|
|
}
|
2024-08-27 10:04:05 -07:00
|
|
|
|
|
|
|
func EncryptStream(key, iv, macKey []byte, plaintext io.Reader, ciphertext io.Writer) ([]byte, []byte, uint64, error) {
|
|
|
|
block, err := aes.NewCipher(key)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, 0, fmt.Errorf("failed to create cipher: %w", err)
|
|
|
|
}
|
|
|
|
cbc := cipher.NewCBCEncrypter(block, iv)
|
|
|
|
|
|
|
|
plainHasher := sha256.New()
|
|
|
|
cipherHasher := sha256.New()
|
|
|
|
cipherMAC := hmac.New(sha256.New, macKey)
|
|
|
|
cipherMAC.Write(iv)
|
|
|
|
|
|
|
|
buf := make([]byte, 32*1024)
|
|
|
|
var size int
|
|
|
|
hasMore := true
|
|
|
|
for hasMore {
|
|
|
|
var n int
|
|
|
|
n, err = io.ReadFull(plaintext, buf)
|
|
|
|
plainHasher.Write(buf[:n])
|
|
|
|
size += n
|
|
|
|
if errors.Is(err, io.EOF) || errors.Is(err, io.ErrUnexpectedEOF) {
|
|
|
|
padding := aes.BlockSize - size%aes.BlockSize
|
|
|
|
buf = append(buf[:n], bytes.Repeat([]byte{byte(padding)}, padding)...)
|
|
|
|
hasMore = false
|
|
|
|
} else if err != nil {
|
|
|
|
return nil, nil, 0, fmt.Errorf("failed to read file: %w", err)
|
|
|
|
}
|
|
|
|
cbc.CryptBlocks(buf, buf)
|
|
|
|
cipherMAC.Write(buf)
|
|
|
|
cipherHasher.Write(buf)
|
|
|
|
_, err = ciphertext.Write(buf)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, 0, fmt.Errorf("failed to write file: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
mac := cipherMAC.Sum(nil)[:10]
|
|
|
|
cipherHasher.Write(mac)
|
|
|
|
_, err = ciphertext.Write(mac)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, 0, fmt.Errorf("failed to write checksum to file: %w", err)
|
|
|
|
}
|
|
|
|
return plainHasher.Sum(nil), cipherHasher.Sum(nil), uint64(size), nil
|
|
|
|
}
|