forked from 89hmdys/toast
/
mode.go
81 lines (64 loc) · 1.97 KB
/
mode.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
package rsa
import (
"crypto"
"crypto/rand"
"crypto/rsa"
"errors"
)
type CipherMode interface {
Encrypt(plainText []byte, puk *rsa.PublicKey) ([]byte, error)
Decrypt(cipherText []byte, prk *rsa.PrivateKey) ([]byte, error)
}
type cipherMode int64
type pkcs1v15Cipher cipherMode
func NewPKCS1v15Cipher() CipherMode {
return new(pkcs1v15Cipher)
}
func (pkcs1v15 *pkcs1v15Cipher) Encrypt(plainText []byte, puk *rsa.PublicKey) ([]byte, error) {
return rsa.EncryptPKCS1v15(rand.Reader, puk, plainText)
}
func (pkcs1v15 *pkcs1v15Cipher) Decrypt(cipherText []byte, prk *rsa.PrivateKey) ([]byte, error) {
return rsa.DecryptPKCS1v15(rand.Reader, prk, cipherText)
}
type SignMode interface {
Sign(src []byte, hash crypto.Hash, prk *rsa.PrivateKey) ([]byte, error)
Verify(src []byte, sign []byte, hash crypto.Hash, puk *rsa.PublicKey) error
}
type signMode int64
type pkcs1v15Sign signMode
func NewPKCS1v15Sign() SignMode {
return new(pkcs1v15Sign)
}
func (pkcs1v15 *pkcs1v15Sign) Sign(src []byte, hash crypto.Hash, prk *rsa.PrivateKey) ([]byte, error) {
if !hash.Available() {
return nil, errors.New("unsupport hash type")
}
h := hash.New()
h.Write(src)
hashed := h.Sum(nil)
return rsa.SignPKCS1v15(rand.Reader, prk, hash, hashed)
}
func (pkcs1v15 *pkcs1v15Sign) Verify(src []byte, sign []byte, hash crypto.Hash, puk *rsa.PublicKey) error {
if !hash.Available() {
return errors.New("unsupport hash type")
}
h := hash.New()
h.Write(src)
hashed := h.Sum(nil)
return rsa.VerifyPKCS1v15(puk, hash, hashed, sign)
}
//type oaepCipher struct {
// h hash.Hash
//}
//
//func NewOAEPCipher() CipherMode {
// return new(oaepCipher)
//}
//
//func (oaep *oaepCipher) Encrypt(plainText []byte, puk *rsa.PublicKey) ([]byte, error) {
// return rsa.EncryptOAEP(oaep.h, rand.Reader, puk, plainText, make([]byte, 0))
//}
//
//func (oaep *oaepCipher) Decrypt(cipherText []byte, prk *rsa.PrivateKey) ([]byte, error) {
// return rsa.DecryptOAEP(oaep.h, rand.Reader, prk, cipherText, make([]byte, 0))
//}