security.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111
  1. package expose
  2. import (
  3. "crypto/rand"
  4. "crypto/rsa"
  5. "crypto/sha512"
  6. "crypto/x509"
  7. "encoding/pem"
  8. "errors"
  9. "log"
  10. )
  11. // GenerateKeyPair generates a new key pair
  12. func GenerateKeyPair(bits int) (*rsa.PrivateKey, *rsa.PublicKey, error) {
  13. privkey, err := rsa.GenerateKey(rand.Reader, bits)
  14. if err != nil {
  15. return nil, nil, err
  16. }
  17. return privkey, &privkey.PublicKey, nil
  18. }
  19. // PrivateKeyToBytes private key to bytes
  20. func PrivateKeyToBytes(priv *rsa.PrivateKey) []byte {
  21. privBytes := pem.EncodeToMemory(
  22. &pem.Block{
  23. Type: "RSA PRIVATE KEY",
  24. Bytes: x509.MarshalPKCS1PrivateKey(priv),
  25. },
  26. )
  27. return privBytes
  28. }
  29. // PublicKeyToBytes public key to bytes
  30. func PublicKeyToBytes(pub *rsa.PublicKey) ([]byte, error) {
  31. pubASN1, err := x509.MarshalPKIXPublicKey(pub)
  32. if err != nil {
  33. return []byte(""), err
  34. }
  35. pubBytes := pem.EncodeToMemory(&pem.Block{
  36. Type: "RSA PUBLIC KEY",
  37. Bytes: pubASN1,
  38. })
  39. return pubBytes, nil
  40. }
  41. // BytesToPrivateKey bytes to private key
  42. func BytesToPrivateKey(priv []byte) (*rsa.PrivateKey, error) {
  43. block, _ := pem.Decode(priv)
  44. enc := x509.IsEncryptedPEMBlock(block)
  45. b := block.Bytes
  46. var err error
  47. if enc {
  48. log.Println("is encrypted pem block")
  49. b, err = x509.DecryptPEMBlock(block, nil)
  50. if err != nil {
  51. return nil, err
  52. }
  53. }
  54. key, err := x509.ParsePKCS1PrivateKey(b)
  55. if err != nil {
  56. return nil, err
  57. }
  58. return key, nil
  59. }
  60. // BytesToPublicKey bytes to public key
  61. func BytesToPublicKey(pub []byte) (*rsa.PublicKey, error) {
  62. block, _ := pem.Decode(pub)
  63. enc := x509.IsEncryptedPEMBlock(block)
  64. b := block.Bytes
  65. var err error
  66. if enc {
  67. log.Println("is encrypted pem block")
  68. b, err = x509.DecryptPEMBlock(block, nil)
  69. if err != nil {
  70. return nil, err
  71. }
  72. }
  73. ifc, err := x509.ParsePKIXPublicKey(b)
  74. if err != nil {
  75. return nil, err
  76. }
  77. key, ok := ifc.(*rsa.PublicKey)
  78. if !ok {
  79. return nil, errors.New("key not valid")
  80. }
  81. return key, nil
  82. }
  83. // EncryptWithPublicKey encrypts data with public key
  84. func EncryptWithPublicKey(msg []byte, pub *rsa.PublicKey) ([]byte, error) {
  85. hash := sha512.New()
  86. ciphertext, err := rsa.EncryptOAEP(hash, rand.Reader, pub, msg, nil)
  87. if err != nil {
  88. return []byte(""), err
  89. }
  90. return ciphertext, nil
  91. }
  92. // DecryptWithPrivateKey decrypts data with private key
  93. func DecryptWithPrivateKey(ciphertext []byte, priv *rsa.PrivateKey) ([]byte, error) {
  94. hash := sha512.New()
  95. plaintext, err := rsa.DecryptOAEP(hash, rand.Reader, priv, ciphertext, nil)
  96. if err != nil {
  97. return []byte(""), err
  98. }
  99. return plaintext, nil
  100. }