rsa.go 1.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657
  1. package util
  2. import (
  3. "bytes"
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "errors"
  7. )
  8. var key = []byte("e2joejiad0wu38912!E2921d!@@1e23u")
  9. // pkcs7Padding 填充
  10. func pkcs7Padding(data []byte, blockSize int) []byte {
  11. padding := blockSize - len(data)%blockSize
  12. padText := bytes.Repeat([]byte{byte(padding)}, padding)
  13. return append(data, padText...)
  14. }
  15. // pkcs7UnPadding 填充的反向操作
  16. func pkcs7UnPadding(data []byte) ([]byte, error) {
  17. length := len(data)
  18. if length == 0 {
  19. return nil, errors.New("加密字符串错误!")
  20. }
  21. unPadding := int(data[length-1])
  22. return data[:(length - unPadding)], nil
  23. }
  24. // AesEncrypt 加密
  25. func AesEncrypt(data []byte) ([]byte, error) {
  26. block, err := aes.NewCipher(key)
  27. if err != nil {
  28. return nil, err
  29. }
  30. blockSize := block.BlockSize()
  31. encryptBytes := pkcs7Padding(data, blockSize)
  32. crypted := make([]byte, len(encryptBytes))
  33. blockMode := cipher.NewCBCEncrypter(block, key[:blockSize])
  34. blockMode.CryptBlocks(crypted, encryptBytes)
  35. return crypted, nil
  36. }
  37. func AesDecrypt(data []byte) ([]byte, error) {
  38. block, err := aes.NewCipher(key)
  39. if err != nil {
  40. return nil, err
  41. }
  42. blockSize := block.BlockSize()
  43. blockMode := cipher.NewCBCDecrypter(block, key[:blockSize])
  44. crypted := make([]byte, len(data))
  45. blockMode.CryptBlocks(crypted, data)
  46. crypted, err = pkcs7UnPadding(crypted)
  47. if err != nil {
  48. return nil, err
  49. }
  50. return crypted, nil
  51. }