Some checks failed
Build SimApp / build (amd64) (push) Waiting to run
Build SimApp / build (arm64) (push) Waiting to run
CodeQL / Analyze (push) Waiting to run
Build & Push / build (push) Waiting to run
Run Gosec / Gosec (push) Waiting to run
Lint / golangci-lint (push) Waiting to run
Checks dependencies and mocks generation / Check go mod tidy (push) Waiting to run
Checks dependencies and mocks generation / Check up to date mocks (push) Waiting to run
System Tests / setup (push) Waiting to run
System Tests / test-system (push) Blocked by required conditions
System Tests / test-system-legacy (push) Blocked by required conditions
Tests / Code Coverage / split-test-files (push) Waiting to run
Tests / Code Coverage / tests (00) (push) Blocked by required conditions
Tests / Code Coverage / tests (01) (push) Blocked by required conditions
Tests / Code Coverage / tests (02) (push) Blocked by required conditions
Tests / Code Coverage / tests (03) (push) Blocked by required conditions
Tests / Code Coverage / test-integration (push) Waiting to run
Tests / Code Coverage / test-e2e (push) Waiting to run
Tests / Code Coverage / repo-analysis (push) Blocked by required conditions
Tests / Code Coverage / test-sim-nondeterminism (push) Waiting to run
Tests / Code Coverage / test-clientv2 (push) Waiting to run
Tests / Code Coverage / test-core (push) Waiting to run
Tests / Code Coverage / test-depinject (push) Waiting to run
Tests / Code Coverage / test-errors (push) Waiting to run
Tests / Code Coverage / test-math (push) Waiting to run
Tests / Code Coverage / test-schema (push) Waiting to run
Tests / Code Coverage / test-collections (push) Waiting to run
Tests / Code Coverage / test-cosmovisor (push) Waiting to run
Tests / Code Coverage / test-confix (push) Waiting to run
Tests / Code Coverage / test-store (push) Waiting to run
Tests / Code Coverage / test-log (push) Waiting to run
Tests / Code Coverage / test-x-tx (push) Waiting to run
Tests / Code Coverage / test-x-nft (push) Waiting to run
Tests / Code Coverage / test-x-circuit (push) Waiting to run
Tests / Code Coverage / test-x-feegrant (push) Waiting to run
Tests / Code Coverage / test-x-evidence (push) Waiting to run
Tests / Code Coverage / test-x-upgrade (push) Waiting to run
Tests / Code Coverage / test-tools-benchmark (push) Waiting to run
Build & Push SDK Proto Builder / build (push) Has been cancelled
67 lines
1.9 KiB
Go
67 lines
1.9 KiB
Go
package xsalsa20symmetric
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"errors"
|
|
"fmt"
|
|
|
|
"golang.org/x/crypto/nacl/secretbox"
|
|
)
|
|
|
|
// TODO, make this into a struct that implements crypto.Symmetric.
|
|
|
|
const (
|
|
nonceLen = 24
|
|
secretLen = 32
|
|
)
|
|
|
|
var ErrCiphertextDecrypt = errors.New("ciphertext decryption failed")
|
|
|
|
// secret must be 32 bytes long. Use something like Sha256(Bcrypt(passphrase))
|
|
// The ciphertext is (secretbox.Overhead + 24) bytes longer than the plaintext.
|
|
func EncryptSymmetric(plaintext, secret []byte) (ciphertext []byte) {
|
|
if len(secret) != secretLen {
|
|
panic(fmt.Sprintf("Secret must be 32 bytes long, got len %v", len(secret)))
|
|
}
|
|
nonce := randBytes(nonceLen)
|
|
nonceArr := [nonceLen]byte{}
|
|
copy(nonceArr[:], nonce)
|
|
secretArr := [secretLen]byte{}
|
|
copy(secretArr[:], secret)
|
|
ciphertext = make([]byte, nonceLen+secretbox.Overhead+len(plaintext))
|
|
copy(ciphertext, nonce)
|
|
secretbox.Seal(ciphertext[nonceLen:nonceLen], plaintext, &nonceArr, &secretArr)
|
|
return ciphertext
|
|
}
|
|
|
|
// secret must be 32 bytes long. Use something like Sha256(Bcrypt(passphrase))
|
|
// The ciphertext is (secretbox.Overhead + 24) bytes longer than the plaintext.
|
|
func DecryptSymmetric(ciphertext, secret []byte) (plaintext []byte, err error) {
|
|
if len(secret) != secretLen {
|
|
panic(fmt.Sprintf("Secret must be 32 bytes long, got len %v", len(secret)))
|
|
}
|
|
if len(ciphertext) <= secretbox.Overhead+nonceLen {
|
|
return nil, errors.New("ciphertext is too short")
|
|
}
|
|
nonce := ciphertext[:nonceLen]
|
|
nonceArr := [nonceLen]byte{}
|
|
copy(nonceArr[:], nonce)
|
|
secretArr := [secretLen]byte{}
|
|
copy(secretArr[:], secret)
|
|
plaintext = make([]byte, len(ciphertext)-nonceLen-secretbox.Overhead)
|
|
_, ok := secretbox.Open(plaintext[:0], ciphertext[nonceLen:], &nonceArr, &secretArr)
|
|
if !ok {
|
|
return nil, ErrCiphertextDecrypt
|
|
}
|
|
return plaintext, nil
|
|
}
|
|
|
|
// This only uses the OS's randomness
|
|
func randBytes(numBytes int) []byte {
|
|
b := make([]byte, numBytes)
|
|
_, err := rand.Read(b)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return b
|
|
}
|