mirror of
				https://github.com/go-gitea/gitea
				synced 2025-09-28 03:28:13 +00:00 
			
		
		
		
	Change all license headers to comply with REUSE specification. Fix #16132 Co-authored-by: flynnnnnnnnnn <flynnnnnnnnnn@github> Co-authored-by: John Olheiser <john.olheiser@gmail.com>
		
			
				
	
	
		
			92 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			92 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2022 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package util
 | |
| 
 | |
| import (
 | |
| 	"crypto/aes"
 | |
| 	"crypto/cipher"
 | |
| 	"crypto/rand"
 | |
| 	"errors"
 | |
| 	"io"
 | |
| 	"os"
 | |
| )
 | |
| 
 | |
| // CopyFile copies file from source to target path.
 | |
| func CopyFile(src, dest string) error {
 | |
| 	si, err := os.Lstat(src)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	sr, err := os.Open(src)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer sr.Close()
 | |
| 
 | |
| 	dw, err := os.Create(dest)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer dw.Close()
 | |
| 
 | |
| 	if _, err = io.Copy(dw, sr); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if err = os.Chtimes(dest, si.ModTime(), si.ModTime()); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	return os.Chmod(dest, si.Mode())
 | |
| }
 | |
| 
 | |
| // AESGCMEncrypt (from legacy package): encrypts plaintext with the given key using AES in GCM mode. should be replaced.
 | |
| func AESGCMEncrypt(key, plaintext []byte) ([]byte, error) {
 | |
| 	block, err := aes.NewCipher(key)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	gcm, err := cipher.NewGCM(block)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	nonce := make([]byte, gcm.NonceSize())
 | |
| 	if _, err := rand.Read(nonce); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	ciphertext := gcm.Seal(nil, nonce, plaintext, nil)
 | |
| 	return append(nonce, ciphertext...), nil
 | |
| }
 | |
| 
 | |
| // AESGCMDecrypt (from legacy package): decrypts ciphertext with the given key using AES in GCM mode. should be replaced.
 | |
| func AESGCMDecrypt(key, ciphertext []byte) ([]byte, error) {
 | |
| 	block, err := aes.NewCipher(key)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	gcm, err := cipher.NewGCM(block)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	size := gcm.NonceSize()
 | |
| 	if len(ciphertext)-size <= 0 {
 | |
| 		return nil, errors.New("ciphertext is empty")
 | |
| 	}
 | |
| 
 | |
| 	nonce := ciphertext[:size]
 | |
| 	ciphertext = ciphertext[size:]
 | |
| 
 | |
| 	plainText, err := gcm.Open(nil, nonce, ciphertext, nil)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	return plainText, nil
 | |
| }
 |