1
0
Fork 0
mirror of https://github.com/Luzifer/go-openssl.git synced 2024-10-18 06:14:21 +00:00
go-openssl is a small library wrapping the crypto/aes functions in a way the output is compatible to OpenSSL
Find a file
2019-04-29 16:59:22 +02:00
.travis.yml Test: Drop support for pre-1.10, add 1.12 2019-04-29 16:50:41 +02:00
examples_test.go Fix: Functions were renamed, test needs to be renamed 2018-11-02 12:44:45 +01:00
go.mod Fix: v3 versions require another go-modules name 2019-01-29 15:47:55 +01:00
History.md prepare release v3.1.0 2019-04-29 16:59:22 +02:00
LICENSE Add LICENSE 2018-06-04 12:40:06 +02:00
openssl.go Add encrypt/decrypt without base64 encoding 2019-04-29 15:38:49 +02:00
openssl_test.go Test: Sort tests 2019-04-29 16:49:10 +02:00
README.md Update code example in README 2018-11-02 12:56:36 +01:00

Go Report Card

Luzifer / go-openssl

go-openssl is a small library wrapping the crypto/aes functions in a way the output is compatible to OpenSSL / CryptoJS. For all encryption / decryption processes AES256 is used so this library will not be able to decrypt messages generated with other than openssl aes-256-cbc. If you're using CryptoJS to process the data you also need to use AES256 on that side.

Version support

For this library only the latest major version is supported. All prior major versions should no longer be used.

The versioning is following SemVer which means upgrading to a newer major version will break your code!

OpenSSL compatibility

1.1.0c

Starting with v2.0.0 go-openssl generates the encryption keys using sha256sum algorithm. This is the default introduced in OpenSSL 1.1.0c. When encrypting data you can choose which digest method to use and therefore also continue to use md5sum. When decrypting OpenSSL encrypted data md5sum, sha1sum and sha256sum are supported.

1.1.1

The PBKDF2 key derivation is not yet supported.

Installation

# Get the latest version
go get github.com/Luzifer/go-openssl

# OR get a specific version
go get gopkg.in/Luzifer/go-openssl.v3

Usage example

The usage is quite simple as you don't need any special knowledge about OpenSSL and/or AES256:

Encrypt

import (
  "fmt"
  openssl "gopkg.in/Luzifer/go-openssl.v3"
)

func main() {
  plaintext := "Hello World!"
  passphrase := "z4yH36a6zerhfE5427ZV"

  o := openssl.New()

  enc, err := o.EncryptBytes(passphrase, []byte(plaintext), DigestSHA256Sum)
  if err != nil {
    fmt.Printf("An error occurred: %s\n", err)
  }

  fmt.Printf("Encrypted text: %s\n", string(enc))
}

Decrypt

import (
  "fmt"
  openssl "gopkg.in/Luzifer/go-openssl.v3"
)

func main() {
  opensslEncrypted := "U2FsdGVkX19ZM5qQJGe/d5A/4pccgH+arBGTp+QnWPU="
  passphrase := "z4yH36a6zerhfE5427ZV"

  o := openssl.New()

  dec, err := o.DecryptBytes(passphrase, []byte(opensslEncrypted), DigestMD5Sum)
  if err != nil {
    fmt.Printf("An error occurred: %s\n", err)
  }

  fmt.Printf("Decrypted text: %s\n", string(dec))
}

Testing

To execute the tests for this library you need to be on a system having /bin/bash and openssl available as the compatibility of the output is tested directly against the openssl binary. The library itself should be usable on all operating systems supported by Go and crypto/aes.