Add the encrypt toolkit

This commit is contained in:
2025-10-25 02:59:11 +08:00
parent 6dad3971de
commit 41783813b1
6 changed files with 622 additions and 25 deletions

View File

@@ -10,10 +10,7 @@ import (
"strconv"
"strings"
"crypto/rand"
"crypto/rsa"
"crypto/x509"
"encoding/hex"
"encoding/pem"
"github.com/sirupsen/logrus"
)
@@ -310,28 +307,51 @@ func APIGenerateKeysHandler(w http.ResponseWriter, r *http.Request) {
result["private_key"] = ""
case models.AlgorithmRC4:
// 生成16字节随机密钥并返回16位十六进制大写
bytes := make([]byte, 8)
if _, err := rand.Read(bytes); err != nil {
key, err := encrypt.GenerateRC4Key(8) // 生成8字节密钥
if err != nil {
logrus.WithError(err).Error("Failed to generate RC4 key")
http.Error(w, "生成RC4密钥失败", http.StatusInternalServerError)
return
}
result["public_key"] = ""
result["private_key"] = strings.ToUpper(hex.EncodeToString(bytes))
case models.AlgorithmRSA, models.AlgorithmRSADynamic:
// 生成RSA 2048密钥对返回PEM明文字符串
key, err := rsa.GenerateKey(rand.Reader, 2048)
result["private_key"] = strings.ToUpper(hex.EncodeToString(key))
case models.AlgorithmRSA:
// 生成标准RSA 2048密钥对返回PEM明文字符串
publicKey, privateKey, err := encrypt.GenerateRSAKeyPair(2048)
if err != nil {
logrus.WithError(err).Error("Failed to generate RSA key pair")
http.Error(w, "生成RSA密钥失败", http.StatusInternalServerError)
return
}
privBytes := x509.MarshalPKCS1PrivateKey(key)
pubBytes := x509.MarshalPKCS1PublicKey(&key.PublicKey)
privPEM := pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: privBytes})
pubPEM := pem.EncodeToMemory(&pem.Block{Type: "RSA PUBLIC KEY", Bytes: pubBytes})
result["private_key"] = string(privPEM)
result["public_key"] = string(pubPEM)
// 转换为PEM格式
publicKeyPEM, err := encrypt.PublicKeyToPEM(publicKey)
if err != nil {
logrus.WithError(err).Error("Failed to convert public key to PEM")
http.Error(w, "转换公钥格式失败", http.StatusInternalServerError)
return
}
privateKeyPEM, err := encrypt.PrivateKeyToPEM(privateKey)
if err != nil {
logrus.WithError(err).Error("Failed to convert private key to PEM")
http.Error(w, "转换私钥格式失败", http.StatusInternalServerError)
return
}
result["public_key"] = publicKeyPEM
result["private_key"] = privateKeyPEM
case models.AlgorithmRSADynamic:
// 生成RSA动态加密密钥对返回PEM明文字符串
publicKeyPEM, privateKeyPEM, err := encrypt.GenerateRSADynamicKeyPair(2048)
if err != nil {
logrus.WithError(err).Error("Failed to generate RSA dynamic key pair")
http.Error(w, "生成RSA动态密钥失败", http.StatusInternalServerError)
return
}
result["public_key"] = publicKeyPEM
result["private_key"] = privateKeyPEM
case models.AlgorithmEasy:
// 生成易加密密钥对,返回逗号分隔的整数数组字符串
encryptKey, _, err := encrypt.GenerateEasyKey()

112
utils/encrypt/rc4.go Normal file
View File

@@ -0,0 +1,112 @@
package encrypt
import (
"crypto/rand"
"encoding/base64"
"fmt"
)
// RC4Encrypt RC4加密算法结构体
type RC4Encrypt struct {
key []byte
}
// NewRC4Encrypt 创建新的RC4加密实例
func NewRC4Encrypt(key []byte) *RC4Encrypt {
return &RC4Encrypt{
key: key,
}
}
// GenerateRC4Key 生成RC4密钥
func GenerateRC4Key(length int) ([]byte, error) {
if length <= 0 || length > 256 {
length = 16 // 默认16字节密钥
}
key := make([]byte, length)
_, err := rand.Read(key)
if err != nil {
return nil, fmt.Errorf("生成RC4密钥失败: %v", err)
}
return key, nil
}
// rc4KeyScheduling RC4密钥调度算法(KSA)
func (r *RC4Encrypt) rc4KeyScheduling() []int {
s := make([]int, 256)
// 初始化S盒
for i := 0; i < 256; i++ {
s[i] = i
}
// 密钥调度
j := 0
keyLen := len(r.key)
for i := 0; i < 256; i++ {
j = (j + s[i] + int(r.key[i%keyLen])) % 256
s[i], s[j] = s[j], s[i] // 交换
}
return s
}
// rc4PseudoRandomGeneration RC4伪随机生成算法(PRGA)
func (r *RC4Encrypt) rc4PseudoRandomGeneration(s []int, data []byte) []byte {
result := make([]byte, len(data))
i, j := 0, 0
for k, b := range data {
i = (i + 1) % 256
j = (j + s[i]) % 256
s[i], s[j] = s[j], s[i] // 交换
keystream := s[(s[i]+s[j])%256]
result[k] = b ^ byte(keystream)
}
return result
}
// Encrypt RC4加密
func (r *RC4Encrypt) Encrypt(plaintext string) (string, error) {
if len(r.key) == 0 {
return "", fmt.Errorf("RC4密钥不能为空")
}
data := []byte(plaintext)
s := r.rc4KeyScheduling()
encrypted := r.rc4PseudoRandomGeneration(s, data)
// Base64编码
return base64.StdEncoding.EncodeToString(encrypted), nil
}
// Decrypt RC4解密
func (r *RC4Encrypt) Decrypt(ciphertext string) (string, error) {
if len(r.key) == 0 {
return "", fmt.Errorf("RC4密钥不能为空")
}
// Base64解码
data, err := base64.StdEncoding.DecodeString(ciphertext)
if err != nil {
return "", fmt.Errorf("Base64解码失败: %v", err)
}
s := r.rc4KeyScheduling()
decrypted := r.rc4PseudoRandomGeneration(s, data)
return string(decrypted), nil
}
// ParseRC4KeyFromString 从字符串解析RC4密钥
func ParseRC4KeyFromString(keyStr string) ([]byte, error) {
key, err := base64.StdEncoding.DecodeString(keyStr)
if err != nil {
return nil, fmt.Errorf("解析RC4密钥失败: %v", err)
}
return key, nil
}

105
utils/encrypt/rsa.go Normal file
View File

@@ -0,0 +1,105 @@
package encrypt
import (
"crypto/rand"
"crypto/rsa"
"crypto/x509"
"encoding/pem"
"fmt"
)
// GenerateRSAKeyPair 生成RSA密钥对公共函数
func GenerateRSAKeyPair(bits int) (*rsa.PublicKey, *rsa.PrivateKey, error) {
if bits < 1024 {
bits = 2048 // 默认2048位
}
privateKey, err := rsa.GenerateKey(rand.Reader, bits)
if err != nil {
return nil, nil, fmt.Errorf("生成RSA密钥对失败: %v", err)
}
return &privateKey.PublicKey, privateKey, nil
}
// PublicKeyToPEM 将RSA公钥转换为PEM格式字符串公共函数
func PublicKeyToPEM(publicKey *rsa.PublicKey) (string, error) {
publicKeyBytes, err := x509.MarshalPKIXPublicKey(publicKey)
if err != nil {
return "", fmt.Errorf("序列化公钥失败: %v", err)
}
publicKeyPEM := pem.EncodeToMemory(&pem.Block{
Type: "PUBLIC KEY",
Bytes: publicKeyBytes,
})
return string(publicKeyPEM), nil
}
// PrivateKeyToPEM 将RSA私钥转换为PEM格式字符串公共函数
func PrivateKeyToPEM(privateKey *rsa.PrivateKey) (string, error) {
privateKeyBytes := x509.MarshalPKCS1PrivateKey(privateKey)
privateKeyPEM := pem.EncodeToMemory(&pem.Block{
Type: "RSA PRIVATE KEY",
Bytes: privateKeyBytes,
})
return string(privateKeyPEM), nil
}
// PublicKeyFromPEM 从PEM格式字符串解析RSA公钥公共函数
func PublicKeyFromPEM(publicKeyPEM string) (*rsa.PublicKey, error) {
block, _ := pem.Decode([]byte(publicKeyPEM))
if block == nil {
return nil, fmt.Errorf("无效的PEM格式公钥")
}
publicKey, err := x509.ParsePKIXPublicKey(block.Bytes)
if err != nil {
return nil, fmt.Errorf("解析公钥失败: %v", err)
}
rsaPublicKey, ok := publicKey.(*rsa.PublicKey)
if !ok {
return nil, fmt.Errorf("不是RSA公钥")
}
return rsaPublicKey, nil
}
// PrivateKeyFromPEM 从PEM格式字符串解析RSA私钥公共函数
func PrivateKeyFromPEM(privateKeyPEM string) (*rsa.PrivateKey, error) {
block, _ := pem.Decode([]byte(privateKeyPEM))
if block == nil {
return nil, fmt.Errorf("无效的PEM格式私钥")
}
privateKey, err := x509.ParsePKCS1PrivateKey(block.Bytes)
if err != nil {
return nil, fmt.Errorf("解析私钥失败: %v", err)
}
return privateKey, nil
}
// GenerateRSAKeyPairPEM 生成RSA密钥对并返回PEM格式字符串公共函数
func GenerateRSAKeyPairPEM(bits int) (string, string, error) {
publicKey, privateKey, err := GenerateRSAKeyPair(bits)
if err != nil {
return "", "", err
}
publicKeyPEM, err := PublicKeyToPEM(publicKey)
if err != nil {
return "", "", err
}
privateKeyPEM, err := PrivateKeyToPEM(privateKey)
if err != nil {
return "", "", err
}
return publicKeyPEM, privateKeyPEM, nil
}

View File

@@ -0,0 +1,190 @@
package encrypt
import (
"crypto/rand"
"crypto/rsa"
"encoding/base64"
"errors"
"fmt"
)
// RSADynamicEncrypt RAS动态加密算法结构体
type RSADynamicEncrypt struct {
publicKey *rsa.PublicKey
privateKey *rsa.PrivateKey
}
// NewRSADynamicEncrypt 创建新的RAS动态加密实例
func NewRSADynamicEncrypt(publicKeyPEM, privateKeyPEM string) (*RSADynamicEncrypt, error) {
var pubKey *rsa.PublicKey
var privKey *rsa.PrivateKey
var err error
// 解析公钥
if publicKeyPEM != "" {
pubKey, err = PublicKeyFromPEM(publicKeyPEM) // 使用公共函数
if err != nil {
return nil, fmt.Errorf("failed to parse public key: %v", err)
}
}
// 解析私钥
if privateKeyPEM != "" {
privKey, err = PrivateKeyFromPEM(privateKeyPEM) // 使用公共函数
if err != nil {
return nil, fmt.Errorf("failed to parse private key: %v", err)
}
}
return &RSADynamicEncrypt{
publicKey: pubKey,
privateKey: privKey,
}, nil
}
// GenerateRSADynamicKeyPair 生成RSA动态加密密钥对
func GenerateRSADynamicKeyPair(bits int) (string, string, error) {
return GenerateRSAKeyPairPEM(bits) // 使用公共函数
}
// generateDynamicKeys 生成动态密钥
func generateDynamicKeys() ([]byte, error) {
// 生成3-6个随机密钥长度
var lengthByte [1]byte
if _, err := rand.Read(lengthByte[:]); err != nil {
return nil, err
}
keyLen := 3 + int(lengthByte[0])%4 // 3-6个密钥
keys := make([]byte, keyLen)
for i := 0; i < keyLen; i++ {
var keyByte [1]byte
if _, err := rand.Read(keyByte[:]); err != nil {
return nil, err
}
// 确保密钥在1-255范围内
keys[i] = keyByte[0]
if keys[i] == 0 {
keys[i] = 1
}
}
return keys, nil
}
// xorEncrypt 使用动态密钥进行XOR加密
func xorEncrypt(data []byte, keys []byte) []byte {
result := make([]byte, len(data))
copy(result, data)
for _, key := range keys {
for i := range result {
result[i] ^= key
}
}
return result
}
// xorDecrypt 使用动态密钥进行XOR解密与加密相同
func xorDecrypt(data []byte, keys []byte) []byte {
return xorEncrypt(data, keys) // XOR解密与加密相同
}
// Encrypt RAS动态加密
func (r *RSADynamicEncrypt) Encrypt(plaintext string) (string, error) {
if r.publicKey == nil {
return "", errors.New("public key not set")
}
// 1. 生成动态密钥
dynamicKeys, err := generateDynamicKeys()
if err != nil {
return "", fmt.Errorf("failed to generate dynamic keys: %v", err)
}
// 2. 使用动态密钥对明文进行XOR加密
plaintextBytes := []byte(plaintext)
xorEncrypted := xorEncrypt(plaintextBytes, dynamicKeys)
// 3. 构造最终数据:密钥长度 + 密钥 + 加密数据
finalData := make([]byte, 0, 1+len(dynamicKeys)+len(xorEncrypted))
finalData = append(finalData, byte(len(dynamicKeys))) // 密钥长度
// 按逆序插入密钥与C++代码保持一致)
for i := len(dynamicKeys) - 1; i >= 0; i-- {
finalData = append(finalData, dynamicKeys[i])
}
finalData = append(finalData, xorEncrypted...) // 加密数据
// 4. 使用RSA公钥加密
rsaEncrypted, err := rsa.EncryptPKCS1v15(rand.Reader, r.publicKey, finalData)
if err != nil {
return "", fmt.Errorf("RSA encryption failed: %v", err)
}
// 5. Base64编码
return base64.StdEncoding.EncodeToString(rsaEncrypted), nil
}
// Decrypt RAS动态解密
func (r *RSADynamicEncrypt) Decrypt(ciphertext string) (string, error) {
if r.privateKey == nil {
return "", errors.New("private key not set")
}
// 1. Base64解码
rsaEncrypted, err := base64.StdEncoding.DecodeString(ciphertext)
if err != nil {
return "", fmt.Errorf("base64 decode failed: %v", err)
}
// 2. 使用RSA私钥解密
decryptedData, err := rsa.DecryptPKCS1v15(rand.Reader, r.privateKey, rsaEncrypted)
if err != nil {
return "", fmt.Errorf("RSA decryption failed: %v", err)
}
if len(decryptedData) < 1 {
return "", errors.New("decrypted data too short")
}
// 3. 提取密钥长度
keyLen := int(decryptedData[0])
if len(decryptedData) < 1+keyLen {
return "", errors.New("invalid decrypted data format")
}
// 4. 提取动态密钥(按逆序存储的)
dynamicKeys := make([]byte, keyLen)
for i := 0; i < keyLen; i++ {
dynamicKeys[keyLen-1-i] = decryptedData[1+i] // 恢复原始顺序
}
// 5. 提取XOR加密的数据
xorEncryptedData := decryptedData[1+keyLen:]
// 6. 使用动态密钥进行XOR解密
plaintext := xorDecrypt(xorEncryptedData, dynamicKeys)
return string(plaintext), nil
}
// EncryptWithKeys 使用指定的公钥进行RAS动态加密
func EncryptWithKeys(plaintext, publicKeyPEM string) (string, error) {
rsaEncrypt, err := NewRSADynamicEncrypt(publicKeyPEM, "")
if err != nil {
return "", err
}
return rsaEncrypt.Encrypt(plaintext)
}
// DecryptWithKeys 使用指定的私钥进行RAS动态解密
func DecryptWithKeys(ciphertext, privateKeyPEM string) (string, error) {
rsaEncrypt, err := NewRSADynamicEncrypt("", privateKeyPEM)
if err != nil {
return "", err
}
return rsaEncrypt.Decrypt(ciphertext)
}

View File

@@ -0,0 +1,124 @@
package encrypt
import (
"crypto/rand"
"crypto/rsa"
"crypto/sha256"
"encoding/base64"
"fmt"
)
// RSAEncrypt 普通RSA加密算法结构体
type RSAEncrypt struct {
publicKey *rsa.PublicKey
privateKey *rsa.PrivateKey
}
// NewRSAEncrypt 创建新的RSA加密实例
func NewRSAEncrypt(publicKey *rsa.PublicKey, privateKey *rsa.PrivateKey) *RSAEncrypt {
return &RSAEncrypt{
publicKey: publicKey,
privateKey: privateKey,
}
}
// Encrypt RSA公钥加密
func (r *RSAEncrypt) Encrypt(plaintext string) (string, error) {
if r.publicKey == nil {
return "", fmt.Errorf("RSA公钥不能为空")
}
data := []byte(plaintext)
// 使用OAEP填充进行加密
encrypted, err := rsa.EncryptOAEP(sha256.New(), rand.Reader, r.publicKey, data, nil)
if err != nil {
return "", fmt.Errorf("RSA加密失败: %v", err)
}
// Base64编码
return base64.StdEncoding.EncodeToString(encrypted), nil
}
// Decrypt RSA私钥解密
func (r *RSAEncrypt) Decrypt(ciphertext string) (string, error) {
if r.privateKey == nil {
return "", fmt.Errorf("RSA私钥不能为空")
}
// Base64解码
data, err := base64.StdEncoding.DecodeString(ciphertext)
if err != nil {
return "", fmt.Errorf("Base64解码失败: %v", err)
}
// 使用OAEP填充进行解密
decrypted, err := rsa.DecryptOAEP(sha256.New(), rand.Reader, r.privateKey, data, nil)
if err != nil {
return "", fmt.Errorf("RSA解密失败: %v", err)
}
return string(decrypted), nil
}
// EncryptLargeData RSA分块加密大数据
func (r *RSAEncrypt) EncryptLargeData(plaintext string) (string, error) {
if r.publicKey == nil {
return "", fmt.Errorf("RSA公钥不能为空")
}
data := []byte(plaintext)
keySize := r.publicKey.Size()
blockSize := keySize - 2*sha256.Size - 2 // OAEP填充的最大明文长度
var encrypted []byte
for i := 0; i < len(data); i += blockSize {
end := i + blockSize
if end > len(data) {
end = len(data)
}
block := data[i:end]
encryptedBlock, err := rsa.EncryptOAEP(sha256.New(), rand.Reader, r.publicKey, block, nil)
if err != nil {
return "", fmt.Errorf("RSA分块加密失败: %v", err)
}
encrypted = append(encrypted, encryptedBlock...)
}
return base64.StdEncoding.EncodeToString(encrypted), nil
}
// DecryptLargeData RSA分块解密大数据
func (r *RSAEncrypt) DecryptLargeData(ciphertext string) (string, error) {
if r.privateKey == nil {
return "", fmt.Errorf("RSA私钥不能为空")
}
data, err := base64.StdEncoding.DecodeString(ciphertext)
if err != nil {
return "", fmt.Errorf("Base64解码失败: %v", err)
}
keySize := r.privateKey.Size()
var decrypted []byte
for i := 0; i < len(data); i += keySize {
end := i + keySize
if end > len(data) {
end = len(data)
}
block := data[i:end]
decryptedBlock, err := rsa.DecryptOAEP(sha256.New(), rand.Reader, r.privateKey, block, nil)
if err != nil {
return "", fmt.Errorf("RSA分块解密失败: %v", err)
}
decrypted = append(decrypted, decryptedBlock...)
}
return string(decrypted), nil
}

View File

@@ -19,7 +19,7 @@
<div class="layui-inline">
<label class="layui-form-label">搜索</label>
<div class="layui-input-inline">
<input type="text" name="search" placeholder="API密钥/应用UUID" autocomplete="off" class="layui-input" />
<input type="text" name="search" placeholder="API接口/应用UUID" autocomplete="off" class="layui-input" />
</div>
</div>
<div class="layui-inline">
@@ -38,7 +38,7 @@
<script type="text/html" id="tpl-apis-ops">
<div style="white-space: nowrap;">
<a class="layui-btn layui-btn-xs" lay-event="edit">编辑</a>
<a class="layui-btn layui-btn-danger layui-btn-xs" lay-event="reset">重置密钥</a>
<a class="layui-btn layui-btn-danger layui-btn-xs" lay-event="reset">重置接口</a>
</div>
</script>
<script type="text/html" id="tpl-apis-status">
@@ -149,6 +149,46 @@ layui.use(['table', 'form', 'layer', 'dropdown'], function() {
// 当前选中的应用UUID
var currentAppUUID = '';
// 复制到剪贴板函数
window.copyToClipboard = function(text) {
if (navigator.clipboard && window.isSecureContext) {
// 使用现代 Clipboard API
navigator.clipboard.writeText(text).then(function() {
layer.msg('接口地址已复制到剪贴板', {icon: 1, time: 2000});
}).catch(function(err) {
console.error('复制失败:', err);
fallbackCopyTextToClipboard(text);
});
} else {
// 降级方案
fallbackCopyTextToClipboard(text);
}
};
// 降级复制方案
function fallbackCopyTextToClipboard(text) {
var textArea = document.createElement("textarea");
textArea.value = text;
textArea.style.top = "0";
textArea.style.left = "0";
textArea.style.position = "fixed";
document.body.appendChild(textArea);
textArea.focus();
textArea.select();
try {
var successful = document.execCommand('copy');
if (successful) {
layer.msg('接口地址已复制到剪贴板', {icon: 1, time: 2000});
} else {
layer.msg('复制失败,请手动复制', {icon: 2, time: 3000});
}
} catch (err) {
console.error('复制失败:', err);
layer.msg('复制失败,请手动复制', {icon: 2, time: 3000});
}
document.body.removeChild(textArea);
}
// 初始化接口表格
var apisTable = table.render({
elem: '#apisTable',
@@ -171,15 +211,21 @@ layui.use(['table', 'form', 'layer', 'dropdown'], function() {
limits: [10, 20, 50, 100],
loading: true,
cols: [[
{ type: 'checkbox', width: 50 },
{ field: 'id', title: 'ID', width: 80, sort: true },
{ field: 'app_name', title: '应用名称', minWidth: 150 },
{ field: 'api_type_name', title: '接口类型', minWidth: 120 },
{ field: 'app_name', title: '应用名称', width: 180 },
{ field: 'api_type_name', title: '接口类型', width: 120 },
{
field: 'api_key',
title: 'API密钥',
minWidth: 280,
templet: (d) => '<span style="font-family: monospace; font-size: 12px;">' + d.api_key + '</span>'
title: 'API接口',
minWidth: 350,
templet: (d) => {
const baseUrl = window.location.protocol + '//' + window.location.host;
const fullUrl = baseUrl + '/api/v1/' + d.api_key;
return '<span style="font-family: monospace; font-size: 12px; word-break: break-all; cursor: pointer; color: #1E9FFF; text-decoration: underline;" ' +
'onclick="copyToClipboard(\'' + fullUrl + '\')" title="点击复制接口地址">' +
fullUrl +
'</span>';
}
},
{
field: 'status_name',
@@ -487,7 +533,7 @@ layui.use(['table', 'form', 'layer', 'dropdown'], function() {
shadeClose: false
});
} else if (obj.event === 'reset') {
layer.confirm('确定重置该接口密钥吗?', {icon: 3, title: '提示'}, function(index) {
layer.confirm('确定重置该接口吗?', {icon: 3, title: '提示'}, function(index) {
$.ajax({
url: '/admin/api/apis/reset_key',
type: 'POST',
@@ -495,7 +541,7 @@ layui.use(['table', 'form', 'layer', 'dropdown'], function() {
data: JSON.stringify({ id: data.id }),
success: function(res) {
if (res.success) {
layer.msg('密钥重置成功', {icon: 1});
layer.msg('接口重置成功', {icon: 1});
// 更新当前行的密钥显示
if (res.data && res.data.api_key) {
obj.update({ api_key: res.data.api_key });