GSSM加解密

1、sm2

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
package crypto
 
import (
    "crypto/rand"
 
    "github.com/emmansun/gmsm/sm2"
)
 
func Sm2Decrypt(priKey, cipherText []byte) (plainText []byte, err error) {
    var pK *sm2.PrivateKey
    if pK, err = sm2.NewPrivateKey(priKey); err != nil {
        return
    }
    return sm2.Decrypt(pK, cipherText)
}
 
func Sm2Encrypt(priKey, plainText []byte) (cipherText []byte, err error) {
    var pK *sm2.PrivateKey
    if pK, err = sm2.NewPrivateKey(priKey); err != nil {
        return
    }
    return sm2.Encrypt(rand.Reader, &pK.PublicKey, plainText, nil)
}

  

2、sm4 ecb

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
package crypto
 
import (
    "github.com/emmansun/gmsm/cipher"
    "github.com/emmansun/gmsm/padding"
    "github.com/emmansun/gmsm/sm4"
)
 
func Sm4ECBDecrypt(key, data []byte) ([]byte, error) {
    c, err := sm4.NewCipher(key)
    if err != nil {
        return nil, err
    }
    pkcs7 := padding.NewPKCS7Padding(sm4.BlockSize)
    plaintext := make([]byte, len(data))
    decrypter := cipher.NewECBDecrypter(c)
    decrypter.CryptBlocks(plaintext, data)
    return pkcs7.Unpad(plaintext)
}
 
func Sm4ECBEncrypt(key, data []byte) ([]byte, error) {
    c, err := sm4.NewCipher(key)
    if err != nil {
        return nil, err
    }
    pkcs7 := padding.NewPKCS7Padding(sm4.BlockSize)
    ciphertext := pkcs7.Pad(data)
    encrypter := cipher.NewECBEncrypter(c)
    encrypter.CryptBlocks(ciphertext, data)
    return ciphertext, nil
}

  

 

参考:gmsm/cipher/ecb_sm4_test.go at main · emmansun/gmsm (github.com)

 

posted @   ☞@_@  阅读(22)  评论(0编辑  收藏  举报
相关博文:
阅读排行:
· 阿里最新开源QwQ-32B,效果媲美deepseek-r1满血版,部署成本又又又降低了!
· SQL Server 2025 AI相关能力初探
· 单线程的Redis速度为什么快?
· AI编程工具终极对决:字节Trae VS Cursor,谁才是开发者新宠?
· 开源Multi-agent AI智能体框架aevatar.ai,欢迎大家贡献代码
点击右上角即可分享
微信分享提示