mirror of
https://github.com/casdoor/casdoor.git
synced 2025-05-23 02:35:49 +08:00

* feat: add PasswordObfuscator to the login API * fix: change key error message * fix: remove unnecessary change * fix: fix one * fix: fix two * fix: fix three * fix: fix five * fix: disable organization update when key is invalid * fix: fix six * fix: use Form.Item to control key * fix: update obfuscator.js * Update obfuscator.go * Update obfuscator.go * Update auth.go * fix: remove real-time key monitoring --------- Co-authored-by: Yang Luo <hsluoyz@qq.com>
77 lines
2.2 KiB
Go
77 lines
2.2 KiB
Go
// Copyright 2024 The Casdoor Authors. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package util
|
|
|
|
import (
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"crypto/des"
|
|
"encoding/hex"
|
|
"fmt"
|
|
)
|
|
|
|
func unPaddingPkcs7(s []byte) []byte {
|
|
length := len(s)
|
|
if length == 0 {
|
|
return s
|
|
}
|
|
unPadding := int(s[length-1])
|
|
return s[:(length - unPadding)]
|
|
}
|
|
|
|
func decryptDesOrAes(passwordCipher string, block cipher.Block) (string, error) {
|
|
passwordCipherBytes, err := hex.DecodeString(passwordCipher)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
if len(passwordCipherBytes) < block.BlockSize() {
|
|
return "", fmt.Errorf("the password ciphertext should contain a random hexadecimal string of length %d at the beginning", block.BlockSize()*2)
|
|
}
|
|
|
|
iv := passwordCipherBytes[:block.BlockSize()]
|
|
password := make([]byte, len(passwordCipherBytes)-block.BlockSize())
|
|
|
|
mode := cipher.NewCBCDecrypter(block, iv)
|
|
mode.CryptBlocks(password, passwordCipherBytes[block.BlockSize():])
|
|
|
|
return string(unPaddingPkcs7(password)), nil
|
|
}
|
|
|
|
func GetUnobfuscatedPassword(passwordObfuscatorType string, passwordObfuscatorKey string, passwordCipher string) (string, error) {
|
|
if passwordObfuscatorType == "Plain" || passwordObfuscatorType == "" {
|
|
return passwordCipher, nil
|
|
} else if passwordObfuscatorType == "DES" || passwordObfuscatorType == "AES" {
|
|
key, err := hex.DecodeString(passwordObfuscatorKey)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var block cipher.Block
|
|
if passwordObfuscatorType == "DES" {
|
|
block, err = des.NewCipher(key)
|
|
} else {
|
|
block, err = aes.NewCipher(key)
|
|
}
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return decryptDesOrAes(passwordCipher, block)
|
|
} else {
|
|
return "", fmt.Errorf("unsupported password obfuscator type: %s", passwordObfuscatorType)
|
|
}
|
|
}
|