Compare commits
3 Commits
9afd630885
...
f37dce7ddf
| Author | SHA1 | Date |
|---|---|---|
|
|
f37dce7ddf | 4 months ago |
|
|
cbf47ac64d | 4 months ago |
|
|
c23dc2d768 | 4 months ago |
8 changed files with 368 additions and 8 deletions
@ -0,0 +1,101 @@ |
|||||
|
package crypto |
||||
|
|
||||
|
import ( |
||||
|
"fmt" |
||||
|
"os" |
||||
|
) |
||||
|
|
||||
|
// 示例:生成密钥对并存入文件
|
||||
|
func ExampleGenerateAndSaveKeys() { |
||||
|
// 密钥位数
|
||||
|
bits := 2048 |
||||
|
// 用户密码(实际应用中应该从用户输入获取)
|
||||
|
password := "your_secure_password" |
||||
|
// 密钥文件保存路径
|
||||
|
privateKeyPath := "private.pem" |
||||
|
publicKeyPath := "public.pem" |
||||
|
|
||||
|
// 生成并保存密钥对
|
||||
|
err := GenerateAndSaveKeysWithPassword(bits, password, privateKeyPath, publicKeyPath) |
||||
|
if err != nil { |
||||
|
fmt.Printf("生成密钥失败: %v\n", err) |
||||
|
return |
||||
|
} |
||||
|
|
||||
|
fmt.Println("密钥生成和保存成功!") |
||||
|
} |
||||
|
|
||||
|
// 示例:读取并解密私钥
|
||||
|
func ExampleReadAndDecryptPrivateKey() { |
||||
|
// 密码和文件路径
|
||||
|
password := "your_secure_password" |
||||
|
privateKeyPath := "private.pem" |
||||
|
|
||||
|
// 读取加密的私钥文件
|
||||
|
data, err := os.ReadFile(privateKeyPath) |
||||
|
if err != nil { |
||||
|
fmt.Printf("读取私钥文件失败: %v\n", err) |
||||
|
return |
||||
|
} |
||||
|
|
||||
|
// 解密私钥
|
||||
|
privateKey, err := DecryptPrivateKey(data, password) |
||||
|
if err != nil { |
||||
|
fmt.Printf("解密私钥失败: %v\n", err) |
||||
|
return |
||||
|
} |
||||
|
|
||||
|
fmt.Println("私钥解密成功!") |
||||
|
fmt.Printf("私钥模数长度: %d 位\n", privateKey.N.BitLen()) |
||||
|
} |
||||
|
|
||||
|
// 主函数示例(如果单独运行这个文件)
|
||||
|
func ExampleMain() { |
||||
|
// 生成密钥对
|
||||
|
ExampleGenerateAndSaveKeys() |
||||
|
|
||||
|
// 读取并解密私钥
|
||||
|
ExampleReadAndDecryptPrivateKey() |
||||
|
} |
||||
|
|
||||
|
/* |
||||
|
使用说明: |
||||
|
|
||||
|
1. 生成密钥对: |
||||
|
- 调用GenerateAndSaveKeysWithPassword函数 |
||||
|
- 参数:密钥位数(通常2048或4096)、保护私钥的密码、私钥保存路径、公钥保存路径 |
||||
|
|
||||
|
2. 读取并解密私钥: |
||||
|
- 读取私钥文件 |
||||
|
- 调用DecryptPrivateKey函数用密码解密 |
||||
|
|
||||
|
3. 注意事项: |
||||
|
- 密码应足够复杂且安全存储 |
||||
|
- 私钥文件应妥善保管,建议设置严格的文件权限 |
||||
|
- 密钥位数推荐使用2048位以上以保证安全性 |
||||
|
|
||||
|
示例代码: |
||||
|
|
||||
|
package main |
||||
|
|
||||
|
import ( |
||||
|
"fmt" |
||||
|
"your_project/crypto" |
||||
|
) |
||||
|
|
||||
|
func main() { |
||||
|
// 生成密钥对
|
||||
|
bits := 2048 |
||||
|
password := "your_secure_password" |
||||
|
privateKeyPath := "private.pem" |
||||
|
publicKeyPath := "public.pem" |
||||
|
|
||||
|
err := crypto.GenerateAndSaveKeysWithPassword(bits, password, privateKeyPath, publicKeyPath) |
||||
|
if err != nil { |
||||
|
fmt.Printf("错误: %v\n", err) |
||||
|
return |
||||
|
} |
||||
|
|
||||
|
fmt.Println("密钥生成完成!") |
||||
|
} |
||||
|
*/ |
||||
@ -0,0 +1,191 @@ |
|||||
|
package crypto |
||||
|
|
||||
|
import ( |
||||
|
"crypto/rand" |
||||
|
"crypto/rsa" |
||||
|
"crypto/x509" |
||||
|
"encoding/pem" |
||||
|
"errors" |
||||
|
"fmt" |
||||
|
|
||||
|
"golang.org/x/crypto/bcrypt" |
||||
|
|
||||
|
"os" |
||||
|
) |
||||
|
|
||||
|
// KeyPair 表示生成的密钥对
|
||||
|
type KeyPair struct { |
||||
|
PrivateKey *rsa.PrivateKey |
||||
|
PublicKey *rsa.PublicKey |
||||
|
} |
||||
|
|
||||
|
// GenerateRSAKeyPair 生成指定位数的RSA密钥对
|
||||
|
func GenerateRSAKeyPair(bits int) (*KeyPair, error) { |
||||
|
// 生成RSA私钥
|
||||
|
privateKey, err := rsa.GenerateKey(rand.Reader, bits) |
||||
|
if err != nil { |
||||
|
return nil, fmt.Errorf("生成RSA密钥失败: %v", err) |
||||
|
} |
||||
|
|
||||
|
// 验证私钥
|
||||
|
err = privateKey.Validate() |
||||
|
if err != nil { |
||||
|
return nil, fmt.Errorf("验证RSA密钥失败: %v", err) |
||||
|
} |
||||
|
|
||||
|
// 获取公钥
|
||||
|
publicKey := &privateKey.PublicKey |
||||
|
|
||||
|
return &KeyPair{ |
||||
|
PrivateKey: privateKey, |
||||
|
PublicKey: publicKey, |
||||
|
}, nil |
||||
|
} |
||||
|
|
||||
|
// EncryptPrivateKey 使用密码加密私钥
|
||||
|
func EncryptPrivateKey(privateKey *rsa.PrivateKey, password string) ([]byte, error) { |
||||
|
if password == "" { |
||||
|
return nil, errors.New("密码不能为空") |
||||
|
} |
||||
|
|
||||
|
// 将私钥转换为PKCS#1格式
|
||||
|
privDER := x509.MarshalPKCS1PrivateKey(privateKey) |
||||
|
|
||||
|
// 使用密码加密私钥
|
||||
|
block, err := x509.EncryptPEMBlock( |
||||
|
rand.Reader, |
||||
|
"RSA PRIVATE KEY", |
||||
|
privDER, |
||||
|
[]byte(password), |
||||
|
x509.PEMCipherAES256, |
||||
|
) |
||||
|
if err != nil { |
||||
|
return nil, fmt.Errorf("加密私钥失败: %v", err) |
||||
|
} |
||||
|
|
||||
|
// 将加密后的私钥转换为PEM格式
|
||||
|
encprivPEM := pem.EncodeToMemory(block) |
||||
|
|
||||
|
return encprivPEM, nil |
||||
|
} |
||||
|
|
||||
|
// ExportPublicKey 将公钥导出为PEM格式
|
||||
|
func ExportPublicKey(publicKey *rsa.PublicKey) ([]byte, error) { |
||||
|
// 将公钥转换为DER格式
|
||||
|
pubDER, err := x509.MarshalPKIXPublicKey(publicKey) |
||||
|
if err != nil { |
||||
|
return nil, fmt.Errorf("编码公钥失败: %v", err) |
||||
|
} |
||||
|
|
||||
|
// 创建PEM块
|
||||
|
block := &pem.Block{ |
||||
|
Type: "RSA PUBLIC KEY", |
||||
|
Bytes: pubDER, |
||||
|
} |
||||
|
|
||||
|
// 将公钥转换为PEM格式
|
||||
|
pubPEM := pem.EncodeToMemory(block) |
||||
|
|
||||
|
return pubPEM, nil |
||||
|
} |
||||
|
|
||||
|
// HashPassword 对密码进行哈希处理
|
||||
|
func HashPassword(password string) (string, error) { |
||||
|
hash, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost) |
||||
|
if err != nil { |
||||
|
return "", err |
||||
|
} |
||||
|
return string(hash), nil |
||||
|
} |
||||
|
|
||||
|
// CheckPasswordHash 验证密码是否与哈希值匹配
|
||||
|
func CheckPasswordHash(password, hash string) bool { |
||||
|
err := bcrypt.CompareHashAndPassword([]byte(hash), []byte(password)) |
||||
|
return err == nil |
||||
|
} |
||||
|
|
||||
|
// GenerateKeysWithPassword 生成加密的密钥对,返回公钥和加密后的私钥
|
||||
|
func GenerateKeysWithPassword(bits int, password string) (publicKeyPEM []byte, encryptedPrivateKeyPEM []byte, err error) { |
||||
|
// 生成密钥对
|
||||
|
keyPair, err := GenerateRSAKeyPair(bits) |
||||
|
if err != nil { |
||||
|
return nil, nil, err |
||||
|
} |
||||
|
|
||||
|
// 加密私钥
|
||||
|
encryptedPrivateKeyPEM, err = EncryptPrivateKey(keyPair.PrivateKey, password) |
||||
|
if err != nil { |
||||
|
return nil, nil, err |
||||
|
} |
||||
|
|
||||
|
// 导出公钥
|
||||
|
publicKeyPEM, err = ExportPublicKey(keyPair.PublicKey) |
||||
|
if err != nil { |
||||
|
return nil, nil, err |
||||
|
} |
||||
|
|
||||
|
return publicKeyPEM, encryptedPrivateKeyPEM, nil |
||||
|
} |
||||
|
|
||||
|
// DecryptPrivateKey 使用密码解密私钥
|
||||
|
func DecryptPrivateKey(encryptedPrivateKeyPEM []byte, password string) (*rsa.PrivateKey, error) { |
||||
|
if password == "" { |
||||
|
return nil, errors.New("密码不能为空") |
||||
|
} |
||||
|
|
||||
|
// 解码PEM块
|
||||
|
block, _ := pem.Decode(encryptedPrivateKeyPEM) |
||||
|
if block == nil { |
||||
|
return nil, errors.New("无法解码PEM块") |
||||
|
} |
||||
|
|
||||
|
// 解密私钥
|
||||
|
decryptedDER, err := x509.DecryptPEMBlock(block, []byte(password)) |
||||
|
if err != nil { |
||||
|
return nil, fmt.Errorf("解密私钥失败: %v", err) |
||||
|
} |
||||
|
|
||||
|
// 解析私钥
|
||||
|
privateKey, err := x509.ParsePKCS1PrivateKey(decryptedDER) |
||||
|
if err != nil { |
||||
|
return nil, fmt.Errorf("解析私钥失败: %v", err) |
||||
|
} |
||||
|
|
||||
|
return privateKey, nil |
||||
|
} |
||||
|
|
||||
|
// SaveKeyToFile 将密钥数据保存到指定文件
|
||||
|
func SaveKeyToFile(filePath string, keyData []byte) error { |
||||
|
// 写入文件
|
||||
|
err := os.WriteFile(filePath, keyData, 0600) // 仅用户可读写权限
|
||||
|
if err != nil { |
||||
|
return fmt.Errorf("保存密钥到文件失败: %v", err) |
||||
|
} |
||||
|
|
||||
|
fmt.Printf("密钥已成功保存到: %s\n", filePath) |
||||
|
return nil |
||||
|
} |
||||
|
|
||||
|
// GenerateAndSaveKeysWithPassword 生成密钥对并用密码保护私钥,然后保存到文件
|
||||
|
func GenerateAndSaveKeysWithPassword(bits int, password, privateKeyPath, publicKeyPath string) error { |
||||
|
// 生成密钥对
|
||||
|
publicKeyPEM, encryptedPrivateKeyPEM, err := GenerateKeysWithPassword(bits, password) |
||||
|
if err != nil { |
||||
|
return err |
||||
|
} |
||||
|
|
||||
|
// 保存公钥到文件
|
||||
|
err = SaveKeyToFile(publicKeyPath, publicKeyPEM) |
||||
|
if err != nil { |
||||
|
return err |
||||
|
} |
||||
|
|
||||
|
// 保存加密后的私钥到文件
|
||||
|
err = SaveKeyToFile(privateKeyPath, encryptedPrivateKeyPEM) |
||||
|
if err != nil { |
||||
|
return err |
||||
|
} |
||||
|
|
||||
|
fmt.Println("密钥对已成功生成并保存!") |
||||
|
return nil |
||||
|
} |
||||
@ -0,0 +1,30 @@ |
|||||
|
-----BEGIN RSA PRIVATE KEY----- |
||||
|
Proc-Type: 4,ENCRYPTED |
||||
|
DEK-Info: AES-256-CBC,60c8623b1977ed9926f090a559fefbb7 |
||||
|
|
||||
|
EXkcUgG90PRmUMzWCc9tYhVV/FclX0Kgbnaaj++ssUVLfHqo7ktrQ757VGLuJ2zC |
||||
|
Sr6Gi88jxRJq98i6gCe4EzL0Q1I7pzqlH3bGxervnCtX9nbDiA4UKpDDQ/nsDuBp |
||||
|
fzyTtwx3xu7MXxQX54XADexcfX4kP08h4LJoPJbnRk9dvEI29TUAmwX9vCyCZVec |
||||
|
DE1kYQOLDzJvX4sKMsCiKzjTQwl46LdYHdn3wYzETnmR3/0dIzDLldWt9TZuYue4 |
||||
|
/lpUdtVY2DGC2+2y9jvNlos9vpsZ2FyUi+M0NICmtkiPoqXzqhuPewwZ+hCw3rbe |
||||
|
p/Q12NiMcnX+0cWwNqgZjDgwUOM+b8UW4pYNYlFzzhBBFA88EI4QGJLHM2ougTS2 |
||||
|
9gXrIOwknRdnvIuUzuf7UIJ7s2C6tIhKQyyMbdzZ2tQQQ7ei+S7EpY6fHJ5OfYfK |
||||
|
5KbjuneZV/8eCoT97KInTKqMpT57cFVNHzLlri+9kXPpY6HAl+L8Qp7IhAjfDnp7 |
||||
|
jElgWPaNcuuR4wYJY6ehNBFQ0Hp8SgduquATVf8FssrM4eTyirBsBrMYSbwl3FGZ |
||||
|
H6BuksvCqq31M/k1EscSbGrb99MokMsQTUeNbY438QvukRi6oowXuriqiQwXhgOl |
||||
|
4Xc8AIxeE79dDfPPskbhGWgBxztolrHEpE2Ttdxa/4q95sMHhEqPDtLYri6immqk |
||||
|
WHcly5tlAtA/JiEAxC2dwDL4vkdB0s92+wCXt5HOlkGqXLLkkE9ST+mwpGGwCk/9 |
||||
|
BI65vh87ME/dBCPNfNCK7iKU2E1cRjJmpgD+dowCwH4g8QmIj73t1pZtY6XiWdx3 |
||||
|
5797R8cA62HItmGw05/Ab9niFkecJYhDWM+N7iqLHadhtTubwCkOIE7PkBjuWsL/ |
||||
|
zTj3RlyGxELwokJ6qeC93Zg/OzKGFCdLMHEkD1RIrglYOGBLO1NovFzPHFav8rkB |
||||
|
jEkl4GsQX6OzeImlDOCkx0YH1ron8lydBTY2ohhtwJkn2MDlEa3CYC/yz9IqzzkI |
||||
|
fMBqFpVe/Ehy2ekuRYen5LRBaDG1DhHeCByr00+q7liCqm47bALsiS7O0d8W6mEw |
||||
|
UNr5GkHPCsxq3fk0zw2OuR6txfmCP/tF8jC/SLpZdTv7+sQIqDq5qkcand5nzkT4 |
||||
|
o2Laz6Z5zKj0zwBQ983NQm4Ikz4uJ/eL0vxZ2CtmLi381r1bhWDNyz3KhGbGG7U/ |
||||
|
qfE5sTdS3FaFAT8rrsgUb7pwNX2p9jYkn/KKy9Qp1fCFavdSmN/W0JBSH/3zGMCI |
||||
|
346tShf5D7ZF2Wo9Jn1PKP+YLG1zo5f9KUa28sGgCtly1TJlCSsHC7dOVoVg8s6A |
||||
|
mRDlmE+/xL4AgPLVmupUvNn8uW+Y8iNnlZpmtsSvsIv0p2Xj5T/UZPUQZ3FR8YyB |
||||
|
7CiUOTCq/goUIqv3SnpK7prQ31Uxj13UbiAIZGOVjkkSRlC/eX4oYuxCM+iMFzd4 |
||||
|
XkH6hVOh67AFU/wri1vzQfCfL78XomlMc+nYviI5dwbO/5uSv5bqEThkFO/9arAt |
||||
|
SVshbq1c5hhFRHE4BuIRTobaJLMJcrWwSyfodAxYWpLpY4BVnO/b8Uc+fRVEnvmG |
||||
|
-----END RSA PRIVATE KEY----- |
||||
@ -0,0 +1,9 @@ |
|||||
|
-----BEGIN RSA PUBLIC KEY----- |
||||
|
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvWKj7FVU7KtUUWWeV53K |
||||
|
a1t538iiydZI2VEkRSsXt3LIi6j94PsdOmS8e6ZyByGj0T+deVVEdqO7pvJTlZCt |
||||
|
R5z2gut3Z/heG1SF0o5i6YfZvfeyeNWrW6TVQCy+FCweVA6Zlh1QiLubAfYFclTm |
||||
|
5wdF+suZHSnXS1reborotzRGZzq86XEluIQufdvfk55ixY8R/bdoaR4G/SvNzU+2 |
||||
|
uBYjOxlBbgtnHmPxs3bAk2wCnPunfjlWw0ngk8UVw7XrAdrIwMItpj4Y0iKUsr5Z |
||||
|
CVpheVmHNfjH8oyio/aERdSXnsM4GksFgOlA9wKQ6opwfQSMhH0mMNThpqzKx/Xt |
||||
|
0wIDAQAB |
||||
|
-----END RSA PUBLIC KEY----- |
||||
Loading…
Reference in new issue