| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859 | package cryptoimport (	"crypto/aes"	"crypto/cipher"	"crypto/rand"	"encoding/base64"	"fmt"	"github.com/0xJacky/Nginx-UI/settings"	"github.com/pkg/errors"	"io")// AesEncrypt encrypts text and given key with AES.func AesEncrypt(text []byte) ([]byte, error) {	if len(text) == 0 {		return nil, errors.New("AesEncrypt text is empty")	}	block, err := aes.NewCipher(settings.CryptoSettings.GetSecretMd5())	if err != nil {		return nil, fmt.Errorf("AesEncrypt invalid key: %v", err)	}	b := base64.StdEncoding.EncodeToString(text)	ciphertext := make([]byte, aes.BlockSize+len(b))	iv := ciphertext[:aes.BlockSize]	if _, err = io.ReadFull(rand.Reader, iv); err != nil {		return nil, fmt.Errorf("AesEncrypt unable to read IV: %w", err)	}	cfb := cipher.NewCFBEncrypter(block, iv)	cfb.XORKeyStream(ciphertext[aes.BlockSize:], []byte(b))	return ciphertext, nil}// AesDecrypt decrypts text and given key with AES.func AesDecrypt(text []byte) ([]byte, error) {	block, err := aes.NewCipher(settings.CryptoSettings.GetSecretMd5())	if err != nil {		return nil, err	}	if len(text) < aes.BlockSize {		return nil, errors.New("AesDecrypt ciphertext too short")	}	iv := text[:aes.BlockSize]	text = text[aes.BlockSize:]	cfb := cipher.NewCFBDecrypter(block, iv)	cfb.XORKeyStream(text, text)	data, err := base64.StdEncoding.DecodeString(string(text))	if err != nil {		return nil, fmt.Errorf("AesDecrypt invalid decrypted base64 string: %w", err)	}	return data, nil}
 |