-
Notifications
You must be signed in to change notification settings - Fork 31
/
Copy pathcryptoman.go
81 lines (60 loc) · 1.4 KB
/
cryptoman.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
package main
import (
"io"
"io/ioutil"
"crypto/aes"
"crypto/rand"
"crypto/cipher"
)
type SecurityContext struct {
key []byte
}
func newSecurityContext() *SecurityContext {
context := &SecurityContext{ []byte{} }
context.loadKey()
return context
}
func (sc *SecurityContext) loadKey() {
key, err := ioutil.ReadFile("./includes/sharedkey.txt")
if err != nil {
panic("[!] No key in includes/sharedkey.txt. Exiting!")
}
sc.key = key
}
func (sc *SecurityContext) encrypt(msg []byte) []byte {
c, err := aes.NewCipher(sc.key)
if err != nil {
info(err.Error())
return []byte{}
}
gcm, err := cipher.NewGCM(c)
if err != nil {
info(err.Error())
}
nonce := make([]byte, gcm.NonceSize())
if _, err = io.ReadFull(rand.Reader, nonce); err != nil {
info(err.Error())
}
enc := gcm.Seal(nonce, nonce, msg, nil)
return enc
}
func (sc *SecurityContext) decrypt(encrypted []byte) string {
block, err := aes.NewCipher(sc.key)
if err != nil {
info(err.Error())
return ""
}
gcm, err := cipher.NewGCM(block)
if err != nil {
info(err.Error())
return ""
}
nonceSize := gcm.NonceSize()
nonce, ciphertext := encrypted[:nonceSize], encrypted[nonceSize:]
plaintext, err := gcm.Open(nil, nonce, ciphertext, nil)
if err != nil {
info(err.Error())
return ""
}
return string(plaintext)
}