4a0301fe46
<!-- Thanks for contributing! Provide a description of your changes below and a general summary in the title Please look at the following checklist to ensure that your PR can be accepted quickly: --> ## Description <!--- Describe your changes in detail --> ## Type of Change <!--- Put an `x` in all the boxes that apply: --> - [ ] 🖼️ New icon - [ ] ✨ New feature (non-breaking change which adds functionality) - [ ] 🛠️ Bug fix (non-breaking change which fixes an issue) - [ ] ❌ Breaking change (fix or feature that would cause existing functionality to change) - [ ] 🧹 Code refactor - [ ] ✅ Build configuration change - [ ] 📝 Documentation - [ ] 🗑️ Chore
82 lines
2.5 KiB
Go
82 lines
2.5 KiB
Go
package main
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"errors"
|
|
"fmt"
|
|
|
|
"golang.org/x/crypto/argon2"
|
|
)
|
|
|
|
// deriveArgonKey generates a 32-bit cryptographic key using the Argon2id algorithm.
|
|
// Parameters:
|
|
// - password: The plaintext password to be hashed.
|
|
// - salt: The salt as a base64 encoded string.
|
|
// - memLimit: The memory limit in bytes.
|
|
// - opsLimit: The number of iterations.
|
|
//
|
|
// Returns:
|
|
// - A byte slice representing the derived key.
|
|
// - An error object, which is nil if no error occurs.
|
|
func deriveArgonKey(password, salt string, memLimit, opsLimit int) ([]byte, error) {
|
|
if memLimit < 1024 || opsLimit < 1 {
|
|
return nil, fmt.Errorf("invalid memory or operation limits")
|
|
}
|
|
|
|
// Decode salt from base64
|
|
saltBytes, err := base64.StdEncoding.DecodeString(salt)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("invalid salt: %v", err)
|
|
}
|
|
|
|
// Generate key using Argon2id
|
|
// Note: We're assuming a fixed key length of 32 bytes and changing the threads
|
|
key := argon2.IDKey([]byte(password), saltBytes, uint32(opsLimit), uint32(memLimit/1024), 1, 32)
|
|
|
|
return key, nil
|
|
}
|
|
|
|
// decryptChaCha20poly1305 decrypts the given data using the ChaCha20-Poly1305 algorithm.
|
|
// Parameters:
|
|
// - data: The encrypted data as a byte slice.
|
|
// - key: The key for decryption as a byte slice.
|
|
// - nonce: The nonce for decryption as a byte slice.
|
|
//
|
|
// Returns:
|
|
// - A byte slice representing the decrypted data.
|
|
// - An error object, which is nil if no error occurs.
|
|
// func decryptChaCha20poly13052(data []byte, key []byte, nonce []byte) ([]byte, error) {
|
|
// reader := bytes.NewReader(data)
|
|
// header := sodium.SecretStreamXCPHeader{Bytes: nonce}
|
|
// decoder, err := sodium.MakeSecretStreamXCPDecoder(
|
|
// sodium.SecretStreamXCPKey{Bytes: key},
|
|
// reader,
|
|
// header)
|
|
// if err != nil {
|
|
// log.Println("Failed to make secret stream decoder", err)
|
|
// return nil, err
|
|
// }
|
|
// // Buffer to store the decrypted data
|
|
// decryptedData := make([]byte, len(data))
|
|
// n, err := decoder.Read(decryptedData)
|
|
// if err != nil && err != io.EOF {
|
|
// log.Println("Failed to read from decoder", err)
|
|
// return nil, err
|
|
// }
|
|
// return decryptedData[:n], nil
|
|
// }
|
|
|
|
func decryptChaCha20poly13052(data []byte, key []byte, nonce []byte) ([]byte, error) {
|
|
decryptor, err := NewDecryptor(key, nonce)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
decoded, tag, err := decryptor.Pull(data)
|
|
if tag != TagFinal {
|
|
return nil, errors.New("invalid tag")
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return decoded, nil
|
|
}
|