1
0
mirror of https://github.com/schollz/croc synced 2024-07-08 11:55:46 +00:00
croc/crypto.go
2017-10-17 22:03:48 -06:00

70 lines
1.7 KiB
Go

package main
import (
"crypto/rand"
"crypto/sha256"
"encoding/binary"
"fmt"
mathrand "math/rand"
"strings"
"time"
"github.com/schollz/mnemonicode"
"golang.org/x/crypto/pbkdf2"
)
func init() {
mathrand.Seed(time.Now().UTC().UnixNano())
}
func GetRandomName() string {
result := []string{}
bs := make([]byte, 4)
binary.LittleEndian.PutUint32(bs, mathrand.Uint32())
result = mnemonicode.EncodeWordList(result, bs)
return strings.Join(result, "-")
}
func Encrypt(plaintext []byte, passphrase string) ([]byte, string, string) {
return plaintext, "salt", "iv"
// key, salt := deriveKey(passphrase, nil)
// iv := make([]byte, 12)
// // http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf
// // Section 8.2
// rand.Read(iv)
// b, _ := aes.NewCipher(key)
// aesgcm, _ := cipher.NewGCM(b)
// data := aesgcm.Seal(nil, iv, plaintext, nil)
// return data, hex.EncodeToString(salt), hex.EncodeToString(iv)
}
func Decrypt(data []byte, passphrase string, salt string, iv string) (plaintext []byte, err error) {
return plaintext, nil
// saltBytes, _ := hex.DecodeString(salt)
// ivBytes, _ := hex.DecodeString(iv)
// key, _ := deriveKey(passphrase, saltBytes)
// b, _ := aes.NewCipher(key)
// aesgcm, _ := cipher.NewGCM(b)
// plaintext, err = aesgcm.Open(nil, ivBytes, data, nil)
// return
}
func deriveKey(passphrase string, salt []byte) ([]byte, []byte) {
if salt == nil {
salt = make([]byte, 8)
// http://www.ietf.org/rfc/rfc2898.txt
// Salt.
rand.Read(salt)
}
return pbkdf2.Key([]byte(passphrase), salt, 1000, 32, sha256.New), salt
}
func Hash(data string) string {
return HashBytes([]byte(data))
}
func HashBytes(data []byte) string {
sum := sha256.Sum256(data)
return fmt.Sprintf("%x", sum)
}