Add symmetric AES encryption functions
This commit is contained in:
parent
ffa226acbd
commit
9c0a78e7e2
2 changed files with 67 additions and 0 deletions
31
crypto/subtle.go
Normal file
31
crypto/subtle.go
Normal file
|
|
@ -0,0 +1,31 @@
|
|||
package crypto
|
||||
|
||||
import (
|
||||
"crypto/aes"
|
||||
"crypto/cipher"
|
||||
|
||||
"golang.org/x/crypto/scrypt"
|
||||
)
|
||||
|
||||
// EncryptWithoutIntegrity encrypts data with AES-CTR. Note: this encryption mode is not secure when stored/sent on an untrusted medium.
|
||||
func EncryptWithoutIntegrity(key, input, iv []byte) (output []byte, err error) {
|
||||
var block cipher.Block
|
||||
if block, err = aes.NewCipher(key); err != nil {
|
||||
return
|
||||
}
|
||||
output = make([]byte, len(input))
|
||||
stream := cipher.NewCTR(block, iv)
|
||||
stream.XORKeyStream(output, input)
|
||||
return
|
||||
}
|
||||
|
||||
// DecryptWithoutIntegrity decrypts data encrypted with AES-CTR.
|
||||
func DecryptWithoutIntegrity(key, input, iv []byte) ([]byte, error) {
|
||||
// AES-CTR decryption is identical to encryption.
|
||||
return EncryptWithoutIntegrity(key, input, iv)
|
||||
}
|
||||
|
||||
// DeriveKey derives a key from a password using scrypt.
|
||||
func DeriveKey(password string, salt []byte) ([]byte, error) {
|
||||
return scrypt.Key([]byte(password), salt, 32768, 8, 1, 32)
|
||||
}
|
||||
36
crypto/subtle_test.go
Normal file
36
crypto/subtle_test.go
Normal file
|
|
@ -0,0 +1,36 @@
|
|||
package crypto
|
||||
|
||||
import (
|
||||
"encoding/hex"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestSubtle_EncryptWithoutIntegrity(t *testing.T) {
|
||||
key, _ := hex.DecodeString("9469cccfc8a8d005247f39fa3e5b35a97db456cecf18deac6d84364d0818d763")
|
||||
plaintext := []byte("some plaintext")
|
||||
iv, _ := hex.DecodeString("c828f258a76aad7bc828f258a76aad7b")
|
||||
|
||||
ciphertext, _ := EncryptWithoutIntegrity(key, plaintext, iv)
|
||||
if hex.EncodeToString(ciphertext) != "14697192f7e112fc88d83380693f" {
|
||||
t.Fatal("EncryptWithoutIntegrity returned unexpected result")
|
||||
}
|
||||
}
|
||||
|
||||
func TestSubtle_DecryptWithoutIntegrity(t *testing.T) {
|
||||
key, _ := hex.DecodeString("9469cccfc8a8d005247f39fa3e5b35a97db456cecf18deac6d84364d0818d763")
|
||||
ciphertext, _ := hex.DecodeString("14697192f7e112fc88d83380693f")
|
||||
iv, _ := hex.DecodeString("c828f258a76aad7bc828f258a76aad7b")
|
||||
|
||||
plaintext, _ := DecryptWithoutIntegrity(key, ciphertext, iv)
|
||||
if string(plaintext) != "some plaintext" {
|
||||
t.Fatal("DecryptWithoutIntegrity returned unexpected result")
|
||||
}
|
||||
}
|
||||
|
||||
func TestSubtle_DeriveKey(t *testing.T) {
|
||||
salt, _ := hex.DecodeString("c828f258a76aad7b")
|
||||
dk, _ := DeriveKey("some password", salt)
|
||||
if hex.EncodeToString(dk) != "9469cccfc8a8d005247f39fa3e5b35a97db456cecf18deac6d84364d0818d763" {
|
||||
t.Fatal("DeriveKey returned unexpected result")
|
||||
}
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue