first commit
This commit is contained in:
172
clientsdk/android/aes.go
Normal file
172
clientsdk/android/aes.go
Normal file
@@ -0,0 +1,172 @@
|
||||
package android
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"crypto/aes"
|
||||
"crypto/cipher"
|
||||
"fmt"
|
||||
|
||||
log "github.com/sirupsen/logrus"
|
||||
)
|
||||
|
||||
func padding(src []byte, blocksize int) []byte {
|
||||
padnum := blocksize - len(src)%blocksize
|
||||
pad := bytes.Repeat([]byte{byte(padnum)}, padnum)
|
||||
return append(src, pad...)
|
||||
}
|
||||
|
||||
func unpadding(src []byte) []byte {
|
||||
n := len(src)
|
||||
unpadnum := int(src[n-1])
|
||||
return src[:n-unpadnum]
|
||||
}
|
||||
|
||||
func EncryptAES(src []byte, key []byte) []byte {
|
||||
block, _ := aes.NewCipher(key)
|
||||
src = padding(src, block.BlockSize())
|
||||
blockmode := cipher.NewCBCEncrypter(block, key)
|
||||
blockmode.CryptBlocks(src, src)
|
||||
return src
|
||||
}
|
||||
|
||||
func DecryptAES(src []byte, key []byte) []byte {
|
||||
block, _ := aes.NewCipher(key)
|
||||
blockmode := cipher.NewCBCDecrypter(block, key)
|
||||
blockmode.CryptBlocks(src, src)
|
||||
src = unpadding(src)
|
||||
return src
|
||||
}
|
||||
|
||||
func AESEncrypt(src []byte, key []byte) []byte {
|
||||
block, _ := aes.NewCipher(key)
|
||||
src = padding(src, block.BlockSize())
|
||||
blockmode := cipher.NewCBCEncrypter(block, key)
|
||||
blockmode.CryptBlocks(src, src)
|
||||
return src
|
||||
}
|
||||
|
||||
func AESDecrypt(src []byte, key []byte) []byte {
|
||||
block, _ := aes.NewCipher(key)
|
||||
blockmode := cipher.NewCBCDecrypter(block, key)
|
||||
blockmode.CryptBlocks(src, src)
|
||||
src = unpadding(src)
|
||||
return src
|
||||
}
|
||||
|
||||
func AesEncrypt(RequestSerialize []byte, key []byte) []byte {
|
||||
//根据key 生成密文
|
||||
block, err := aes.NewCipher(key)
|
||||
if err != nil {
|
||||
return nil
|
||||
}
|
||||
|
||||
blockSize := block.BlockSize()
|
||||
RequestSerialize = PKCS5Padding(RequestSerialize, blockSize)
|
||||
|
||||
blockMode := cipher.NewCBCEncrypter(block, key)
|
||||
crypted := make([]byte, len(RequestSerialize))
|
||||
blockMode.CryptBlocks(crypted, RequestSerialize)
|
||||
|
||||
return crypted
|
||||
}
|
||||
|
||||
func AesDecrypt(body []byte, key []byte) []byte {
|
||||
// fmt.Printf("%x\n\n", body)
|
||||
// fmt.Printf("%x\n\n", key)
|
||||
block, err := aes.NewCipher(key)
|
||||
if err != nil {
|
||||
return nil
|
||||
}
|
||||
blockMode := cipher.NewCBCDecrypter(block, key)
|
||||
origData := make([]byte, len(body))
|
||||
blockMode.CryptBlocks(origData, body)
|
||||
origData = PKCS5UnPadding(origData)
|
||||
// fmt.Printf("%x\n", origData)
|
||||
return origData
|
||||
}
|
||||
|
||||
// =================== ECB ======================
|
||||
func AesEncryptECB(origData []byte, key []byte) (encrypted []byte) {
|
||||
cipher, _ := aes.NewCipher(generateKey(key))
|
||||
length := (len(origData) + aes.BlockSize) / aes.BlockSize
|
||||
plain := make([]byte, length*aes.BlockSize)
|
||||
copy(plain, origData)
|
||||
pad := byte(len(plain) - len(origData))
|
||||
for i := len(origData); i < len(plain); i++ {
|
||||
plain[i] = pad
|
||||
}
|
||||
encrypted = make([]byte, len(plain))
|
||||
// 分组分块加密
|
||||
for bs, be := 0, cipher.BlockSize(); bs <= len(origData); bs, be = bs+cipher.BlockSize(), be+cipher.BlockSize() {
|
||||
cipher.Encrypt(encrypted[bs:be], plain[bs:be])
|
||||
}
|
||||
|
||||
return encrypted
|
||||
}
|
||||
|
||||
func AesDecryptECB(encrypted []byte, key []byte) (decrypted []byte) {
|
||||
cipher, _ := aes.NewCipher(generateKey(key))
|
||||
decrypted = make([]byte, len(encrypted))
|
||||
//
|
||||
for bs, be := 0, cipher.BlockSize(); bs < len(encrypted); bs, be = bs+cipher.BlockSize(), be+cipher.BlockSize() {
|
||||
cipher.Decrypt(decrypted[bs:be], encrypted[bs:be])
|
||||
}
|
||||
|
||||
trim := 0
|
||||
if len(decrypted) > 0 {
|
||||
trim = len(decrypted) - int(decrypted[len(decrypted)-1])
|
||||
}
|
||||
|
||||
return decrypted[:trim]
|
||||
}
|
||||
func generateKey(key []byte) (genKey []byte) {
|
||||
genKey = make([]byte, 16)
|
||||
copy(genKey, key)
|
||||
for i := 16; i < len(key); {
|
||||
for j := 0; j < 16 && i < len(key); j, i = j+1, i+1 {
|
||||
genKey[j] ^= key[i]
|
||||
}
|
||||
}
|
||||
return genKey
|
||||
}
|
||||
|
||||
func CompressAndAes(RequestSerialize []byte, aeskey []byte) []byte {
|
||||
compressed := DoZlibCompress(RequestSerialize)
|
||||
return AesEncrypt(compressed, aeskey)
|
||||
}
|
||||
|
||||
func DecompressAndAesDecrypt(body []byte, key []byte) []byte {
|
||||
block, err := aes.NewCipher(key)
|
||||
if err != nil {
|
||||
return nil
|
||||
}
|
||||
|
||||
if len(body)%aes.BlockSize != 0 {
|
||||
log.Error(fmt.Sprintf("crypto/cipher: data is not a multiple of the block size,[BodyLength:%v] [AesLength:%v]", len(body), aes.BlockSize))
|
||||
return nil
|
||||
}
|
||||
|
||||
blockMode := cipher.NewCBCDecrypter(block, key)
|
||||
origData := make([]byte, len(body))
|
||||
blockMode.CryptBlocks(origData, body)
|
||||
origData = PKCS5UnPadding(origData)
|
||||
origData = DoZlibUnCompress(origData)
|
||||
return origData
|
||||
}
|
||||
|
||||
func PKCS5UnPadding(origData []byte) []byte {
|
||||
length := len(origData)
|
||||
unpadding := int(origData[length-1])
|
||||
if length < unpadding {
|
||||
return nil
|
||||
}
|
||||
return origData[:(length - unpadding)]
|
||||
}
|
||||
|
||||
func PKCS5Padding(ciphertext []byte, blockSize int) []byte {
|
||||
padding := blockSize - len(ciphertext)%blockSize
|
||||
//填充
|
||||
padtext := bytes.Repeat([]byte{byte(padding)}, padding)
|
||||
|
||||
return append(ciphertext, padtext...)
|
||||
}
|
||||
Reference in New Issue
Block a user