|
|
|
@ -2,9 +2,9 @@ package main
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"encoding/hex"
|
|
|
|
|
"fmt"
|
|
|
|
|
"go/ast"
|
|
|
|
|
"go/token"
|
|
|
|
|
"log"
|
|
|
|
|
"strconv"
|
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
|
@ -12,7 +12,6 @@ import (
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
func obfuscateLiterals(files []*ast.File) []*ast.File {
|
|
|
|
|
|
|
|
|
|
pre := func(cursor *astutil.Cursor) bool {
|
|
|
|
|
t, ok := cursor.Node().(*ast.GenDecl)
|
|
|
|
|
if !ok {
|
|
|
|
@ -24,7 +23,6 @@ func obfuscateLiterals(files []*ast.File) []*ast.File {
|
|
|
|
|
if t.Tok == token.CONST {
|
|
|
|
|
t.Tok = token.VAR
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
@ -33,9 +31,7 @@ func obfuscateLiterals(files []*ast.File) []*ast.File {
|
|
|
|
|
fset = token.NewFileSet()
|
|
|
|
|
addedToPkg bool // we only want to inject the code and imports once
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
post := func(cursor *astutil.Cursor) bool {
|
|
|
|
|
|
|
|
|
|
switch x := cursor.Node().(type) {
|
|
|
|
|
case *ast.File:
|
|
|
|
|
if !addedToPkg {
|
|
|
|
@ -43,14 +39,8 @@ func obfuscateLiterals(files []*ast.File) []*ast.File {
|
|
|
|
|
x.Decls = append(x.Decls, keyStmt(key))
|
|
|
|
|
|
|
|
|
|
if x.Imports == nil {
|
|
|
|
|
var newDecls = []ast.Decl{
|
|
|
|
|
cryptoAesImportSpec,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, decl := range x.Decls {
|
|
|
|
|
newDecls = append(newDecls, decl)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
newDecls := []ast.Decl{cryptoAesImportSpec}
|
|
|
|
|
newDecls = append(newDecls, x.Decls...)
|
|
|
|
|
x.Decls = newDecls
|
|
|
|
|
} else {
|
|
|
|
|
astutil.AddImport(fset, x, "crypto/aes")
|
|
|
|
@ -58,7 +48,6 @@ func obfuscateLiterals(files []*ast.File) []*ast.File {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
addedToPkg = true
|
|
|
|
|
|
|
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
case *ast.BasicLit:
|
|
|
|
@ -71,15 +60,12 @@ func obfuscateLiterals(files []*ast.File) []*ast.File {
|
|
|
|
|
|
|
|
|
|
value, err := strconv.Unquote(x.Value)
|
|
|
|
|
if err != nil {
|
|
|
|
|
log.Fatalln("[Fatal]: Could not unqote string", err)
|
|
|
|
|
return false
|
|
|
|
|
panic(fmt.Sprintf("cannot unquote string: %v", err))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ciphertext, err := encAes([]byte(value), key)
|
|
|
|
|
ciphertext, err := encAES([]byte(value), key)
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
|
|
|
|
log.Fatalln("[Fatal]: Could not encrypt string:", err)
|
|
|
|
|
return false
|
|
|
|
|
panic(fmt.Sprintf("cannot encrypt string: %v", err))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
cursor.Replace(ciphertextStmt(ciphertext))
|
|
|
|
@ -88,14 +74,14 @@ func obfuscateLiterals(files []*ast.File) []*ast.File {
|
|
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, file := range files {
|
|
|
|
|
file = astutil.Apply(file, pre, post).(*ast.File)
|
|
|
|
|
for i := range files {
|
|
|
|
|
files[i] = astutil.Apply(files[i], pre, post).(*ast.File)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return files
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// ast definitions for injection
|
|
|
|
|
// AST definitions for injection
|
|
|
|
|
var (
|
|
|
|
|
aesCipherStmt = &ast.AssignStmt{
|
|
|
|
|
Lhs: []ast.Expr{
|
|
|
|
@ -103,17 +89,13 @@ var (
|
|
|
|
|
&ast.Ident{Name: "err"},
|
|
|
|
|
},
|
|
|
|
|
Tok: token.DEFINE,
|
|
|
|
|
Rhs: []ast.Expr{
|
|
|
|
|
&ast.CallExpr{
|
|
|
|
|
Rhs: []ast.Expr{&ast.CallExpr{
|
|
|
|
|
Fun: &ast.SelectorExpr{
|
|
|
|
|
X: &ast.Ident{Name: "aes"},
|
|
|
|
|
Sel: &ast.Ident{Name: "NewCipher"},
|
|
|
|
|
},
|
|
|
|
|
Args: []ast.Expr{
|
|
|
|
|
&ast.Ident{Name: "garbleKey"},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
Args: []ast.Expr{&ast.Ident{Name: "garbleKey"}},
|
|
|
|
|
}},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
aesGcmCipherStmt = &ast.AssignStmt{
|
|
|
|
@ -122,17 +104,13 @@ var (
|
|
|
|
|
&ast.Ident{Name: "err"},
|
|
|
|
|
},
|
|
|
|
|
Tok: token.DEFINE,
|
|
|
|
|
Rhs: []ast.Expr{
|
|
|
|
|
&ast.CallExpr{
|
|
|
|
|
Rhs: []ast.Expr{&ast.CallExpr{
|
|
|
|
|
Fun: &ast.SelectorExpr{
|
|
|
|
|
X: &ast.Ident{Name: "cipher"},
|
|
|
|
|
Sel: &ast.Ident{Name: "NewGCM"},
|
|
|
|
|
},
|
|
|
|
|
Args: []ast.Expr{
|
|
|
|
|
&ast.Ident{Name: "block"},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
Args: []ast.Expr{&ast.Ident{Name: "block"}},
|
|
|
|
|
}},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
plaintextStmt = &ast.AssignStmt{
|
|
|
|
@ -141,8 +119,7 @@ var (
|
|
|
|
|
&ast.Ident{Name: "err"},
|
|
|
|
|
},
|
|
|
|
|
Tok: token.DEFINE,
|
|
|
|
|
Rhs: []ast.Expr{
|
|
|
|
|
&ast.CallExpr{
|
|
|
|
|
Rhs: []ast.Expr{&ast.CallExpr{
|
|
|
|
|
Fun: &ast.SelectorExpr{
|
|
|
|
|
X: &ast.Ident{Name: "aesgcm"},
|
|
|
|
|
Sel: &ast.Ident{Name: "Open"},
|
|
|
|
@ -165,20 +142,15 @@ var (
|
|
|
|
|
},
|
|
|
|
|
&ast.Ident{Name: "nil"},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
returnStmt = &ast.ReturnStmt{
|
|
|
|
|
Results: []ast.Expr{
|
|
|
|
|
returnStmt = &ast.ReturnStmt{Results: []ast.Expr{
|
|
|
|
|
&ast.CallExpr{
|
|
|
|
|
Fun: &ast.Ident{Name: "string"},
|
|
|
|
|
Args: []ast.Expr{
|
|
|
|
|
&ast.Ident{Name: "plaintext"},
|
|
|
|
|
},
|
|
|
|
|
Args: []ast.Expr{&ast.Ident{Name: "plaintext"}},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
}}
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
func decErrStmt() *ast.IfStmt {
|
|
|
|
@ -188,56 +160,39 @@ func decErrStmt() *ast.IfStmt {
|
|
|
|
|
Op: token.NEQ,
|
|
|
|
|
Y: &ast.Ident{Name: "nil"},
|
|
|
|
|
},
|
|
|
|
|
Body: &ast.BlockStmt{
|
|
|
|
|
List: []ast.Stmt{
|
|
|
|
|
&ast.ExprStmt{
|
|
|
|
|
X: &ast.CallExpr{
|
|
|
|
|
Body: &ast.BlockStmt{List: []ast.Stmt{
|
|
|
|
|
&ast.ExprStmt{X: &ast.CallExpr{
|
|
|
|
|
Fun: &ast.Ident{Name: "panic"},
|
|
|
|
|
Args: []ast.Expr{
|
|
|
|
|
&ast.BinaryExpr{
|
|
|
|
|
Args: []ast.Expr{&ast.BinaryExpr{
|
|
|
|
|
X: &ast.BasicLit{
|
|
|
|
|
Kind: token.STRING,
|
|
|
|
|
Value: `"[garble] Literal couldn't be decrypted: "`,
|
|
|
|
|
Value: `"garble: literal couldn't be decrypted: "`,
|
|
|
|
|
},
|
|
|
|
|
Op: token.ADD,
|
|
|
|
|
Y: &ast.CallExpr{
|
|
|
|
|
Fun: &ast.SelectorExpr{
|
|
|
|
|
Y: &ast.CallExpr{Fun: &ast.SelectorExpr{
|
|
|
|
|
X: &ast.Ident{Name: "err"},
|
|
|
|
|
Sel: &ast.Ident{Name: "Error"},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}},
|
|
|
|
|
}},
|
|
|
|
|
}},
|
|
|
|
|
}},
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var funcStmt = &ast.FuncDecl{
|
|
|
|
|
Name: &ast.Ident{Name: "garbleDecrypt"},
|
|
|
|
|
Type: &ast.FuncType{
|
|
|
|
|
Params: &ast.FieldList{
|
|
|
|
|
List: []*ast.Field{
|
|
|
|
|
{
|
|
|
|
|
Params: &ast.FieldList{List: []*ast.Field{{
|
|
|
|
|
Names: []*ast.Ident{{Name: "ciphertext"}},
|
|
|
|
|
Type: &ast.ArrayType{
|
|
|
|
|
Elt: &ast.Ident{Name: "byte"},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
Results: &ast.FieldList{
|
|
|
|
|
List: []*ast.Field{
|
|
|
|
|
{
|
|
|
|
|
}}},
|
|
|
|
|
Results: &ast.FieldList{List: []*ast.Field{{
|
|
|
|
|
Type: &ast.Ident{Name: "string"},
|
|
|
|
|
}}},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
Body: &ast.BlockStmt{
|
|
|
|
|
List: []ast.Stmt{
|
|
|
|
|
Body: &ast.BlockStmt{List: []ast.Stmt{
|
|
|
|
|
aesCipherStmt,
|
|
|
|
|
decErrStmt(),
|
|
|
|
|
aesGcmCipherStmt,
|
|
|
|
@ -245,80 +200,62 @@ var funcStmt = &ast.FuncDecl{
|
|
|
|
|
plaintextStmt,
|
|
|
|
|
decErrStmt(),
|
|
|
|
|
returnStmt,
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func ciphertextStmt(ciphertext []byte) *ast.CallExpr {
|
|
|
|
|
ciphertextLit := byteToByteLit(ciphertext)
|
|
|
|
|
ciphertextLit := dataAsByteSlice(ciphertext)
|
|
|
|
|
|
|
|
|
|
return &ast.CallExpr{
|
|
|
|
|
Fun: &ast.Ident{Name: "garbleDecrypt"},
|
|
|
|
|
Args: []ast.Expr{
|
|
|
|
|
ciphertextLit,
|
|
|
|
|
},
|
|
|
|
|
Args: []ast.Expr{ciphertextLit},
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func byteToByteLit(buffer []byte) *ast.CallExpr {
|
|
|
|
|
hexstr := hex.EncodeToString(buffer)
|
|
|
|
|
|
|
|
|
|
// dataAsByteSlice turns a byte slice like []byte{1, 2, 3} into an AST
|
|
|
|
|
// expression which encodes it, such as []byte("\x01\x02\x03").
|
|
|
|
|
func dataAsByteSlice(data []byte) *ast.CallExpr {
|
|
|
|
|
var b strings.Builder
|
|
|
|
|
|
|
|
|
|
b.WriteString(`"`)
|
|
|
|
|
b.WriteByte('"')
|
|
|
|
|
hexstr := hex.EncodeToString(data)
|
|
|
|
|
for i := 0; i < len(hexstr); i += 2 {
|
|
|
|
|
b.WriteString("\\x" + hexstr[i:i+2])
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
b.WriteString(`"`)
|
|
|
|
|
b.WriteByte('"')
|
|
|
|
|
|
|
|
|
|
return &ast.CallExpr{
|
|
|
|
|
Fun: &ast.ArrayType{
|
|
|
|
|
Elt: &ast.Ident{Name: "byte"},
|
|
|
|
|
},
|
|
|
|
|
Args: []ast.Expr{
|
|
|
|
|
&ast.BasicLit{
|
|
|
|
|
Args: []ast.Expr{&ast.BasicLit{
|
|
|
|
|
Kind: token.STRING,
|
|
|
|
|
Value: b.String(),
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}},
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func keyStmt(key []byte) (decl *ast.GenDecl) {
|
|
|
|
|
keyLit := byteToByteLit(key)
|
|
|
|
|
|
|
|
|
|
decl = &ast.GenDecl{
|
|
|
|
|
func keyStmt(key []byte) *ast.GenDecl {
|
|
|
|
|
keyLit := dataAsByteSlice(key)
|
|
|
|
|
return &ast.GenDecl{
|
|
|
|
|
Tok: token.VAR,
|
|
|
|
|
Specs: []ast.Spec{
|
|
|
|
|
&ast.ValueSpec{
|
|
|
|
|
Names: []*ast.Ident{
|
|
|
|
|
{Name: "garbleKey"},
|
|
|
|
|
},
|
|
|
|
|
Values: []ast.Expr{
|
|
|
|
|
keyLit,
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
Specs: []ast.Spec{&ast.ValueSpec{
|
|
|
|
|
Names: []*ast.Ident{{Name: "garbleKey"}},
|
|
|
|
|
Values: []ast.Expr{keyLit},
|
|
|
|
|
}},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var cryptoAesImportSpec = &ast.GenDecl{
|
|
|
|
|
Tok: token.IMPORT,
|
|
|
|
|
Specs: []ast.Spec{
|
|
|
|
|
&ast.ImportSpec{
|
|
|
|
|
Path: &ast.BasicLit{
|
|
|
|
|
&ast.ImportSpec{Path: &ast.BasicLit{
|
|
|
|
|
Kind: token.STRING,
|
|
|
|
|
Value: `"crypto/aes"`,
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
&ast.ImportSpec{
|
|
|
|
|
Path: &ast.BasicLit{
|
|
|
|
|
}},
|
|
|
|
|
&ast.ImportSpec{Path: &ast.BasicLit{
|
|
|
|
|
Kind: token.STRING,
|
|
|
|
|
Value: `"crypto/cipher"`,
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}},
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|