101 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			101 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Go
		
	
	
	
| /*
 | |
|  * Copyright 2025 coze-dev Authors
 | |
|  *
 | |
|  * Licensed under the Apache License, Version 2.0 (the "License");
 | |
|  * you may not use this file except in compliance with the License.
 | |
|  * You may obtain a copy of the License at
 | |
|  *
 | |
|  *     http://www.apache.org/licenses/LICENSE-2.0
 | |
|  *
 | |
|  * Unless required by applicable law or agreed to in writing, software
 | |
|  * distributed under the License is distributed on an "AS IS" BASIS,
 | |
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|  * See the License for the specific language governing permissions and
 | |
|  * limitations under the License.
 | |
|  */
 | |
| 
 | |
| package utils
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"crypto/aes"
 | |
| 	"crypto/cipher"
 | |
| 	"encoding/base64"
 | |
| 	"fmt"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	AuthSecretKey       = "^*6x3hdu2nc%-p38"
 | |
| 	StateSecretKey      = "osj^kfhsd*(z!sno"
 | |
| 	OAuthTokenSecretKey = "cn+$PJ(HhJ[5d*z9"
 | |
| )
 | |
| 
 | |
| func EncryptByAES(val []byte, secretKey string) (string, error) {
 | |
| 	sb := []byte(secretKey)
 | |
| 
 | |
| 	block, err := aes.NewCipher(sb)
 | |
| 	if err != nil {
 | |
| 		return "", err
 | |
| 	}
 | |
| 
 | |
| 	blockSize := block.BlockSize()
 | |
| 	paddingData := pkcs7Padding(val, blockSize)
 | |
| 
 | |
| 	encrypted := make([]byte, len(paddingData))
 | |
| 	blockMode := cipher.NewCBCEncrypter(block, sb[:blockSize])
 | |
| 	blockMode.CryptBlocks(encrypted, paddingData)
 | |
| 
 | |
| 	return base64.RawURLEncoding.EncodeToString(encrypted), nil
 | |
| }
 | |
| 
 | |
| func pkcs7Padding(data []byte, blockSize int) []byte {
 | |
| 	padding := blockSize - len(data)%blockSize
 | |
| 	padText := bytes.Repeat([]byte{byte(padding)}, padding)
 | |
| 
 | |
| 	return append(data, padText...)
 | |
| }
 | |
| 
 | |
| func DecryptByAES(data, secretKey string) ([]byte, error) {
 | |
| 	dataBytes, err := base64.RawURLEncoding.DecodeString(data)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	sb := []byte(secretKey)
 | |
| 
 | |
| 	block, err := aes.NewCipher(sb)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	blockSize := block.BlockSize()
 | |
| 	blockMode := cipher.NewCBCDecrypter(block, sb[:blockSize])
 | |
| 	if len(dataBytes)%blockMode.BlockSize() != 0 {
 | |
| 		return nil, fmt.Errorf("invalid block size")
 | |
| 	}
 | |
| 
 | |
| 	decrypted := make([]byte, len(dataBytes))
 | |
| 	blockMode.CryptBlocks(decrypted, dataBytes)
 | |
| 
 | |
| 	decrypted, err = pkcs7UnPadding(decrypted)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	return decrypted, nil
 | |
| }
 | |
| 
 | |
| func pkcs7UnPadding(decrypted []byte) ([]byte, error) {
 | |
| 	length := len(decrypted)
 | |
| 	if length == 0 {
 | |
| 		return nil, fmt.Errorf("decrypted is empty")
 | |
| 	}
 | |
| 
 | |
| 	unPadding := int(decrypted[length-1])
 | |
| 	if unPadding > length {
 | |
| 		return nil, fmt.Errorf("invalid padding")
 | |
| 	}
 | |
| 
 | |
| 	return decrypted[:(length - unPadding)], nil
 | |
| }
 |