V 1.2 文档已修改

This commit is contained in:
songguangyang
2019-05-30 15:35:26 +08:00
parent 61e9882618
commit 2d9354b893

432
README.md
View File

@@ -18,17 +18,23 @@ go get github.com/wumansgy/goEncrypt
```
func main(){
plaintext := []byte("床前明月光疑是地上霜举头望明月学习go语言")//明文
fmt.Println("明文为:",string(plaintext))
//传入明文和自己定义的密钥密钥为8字节如果不足8字节函数内部自动补全超过8字节函数内部截取
cryptText := goEncrypt.DesCBC_Encrypt(plaintext, []byte("asd12345")) //得到密文
fmt.Println("DES的CBC模式加密后的密文为:", base64.StdEncoding.EncodeToString(cryptText))
//传入密文和自己定义的密钥需要和加密的密钥一样不一样会报错8字节如果不足8字节函数内部自动补全超过8字节函数内部截取
newplaintext := goEncrypt.DesCBC_Decrypt(cryptText, []byte("asd12345")) //解密得到密文
fmt.Println("DES的CBC模式解密完", string(newplaintext))
plaintext := []byte("床前明月光疑是地上霜举头望明月学习go语言") //明文
fmt.Println("明文为:", string(plaintext))
// 传入明文和自己定义的密钥密钥为8字节
cryptText, err := goEncrypt.DesCbcEncrypt(plaintext, []byte("asd12345")) //得到密文
if err != nil {
fmt.Println(err)
}
fmt.Println("DES的CBC模式加密后的密文为:", base64.StdEncoding.EncodeToString(cryptText))
// 传入密文和自己定义的密钥需要和加密的密钥一样不一样会报错8字节 如果解密秘钥错误解密后的明文会为空
newplaintext, err := goEncrypt.DesCbcDecrypt(cryptText, []byte("asd12345")) //解密得到密文
if err != nil {
fmt.Println(err)
}
fmt.Println("DES的CBC模式解密完", string(newplaintext))
}
```
@@ -39,16 +45,22 @@ func main(){
```
func main(){
plaintext := []byte("床前明月光疑是地上霜举头望明月学习go语言")
fmt.Println("明文为:",string(plaintext))
//传入明文和自己定义的密钥密钥为24字节如果不足24字节函数内部自动补全不过超过24字节函数内部截取
cryptText := goEncrypt.TripleDesEncrypt(plaintext, []byte("wumansgy12345678asdfghjk"))
fmt.Println("三重DES的CBC模式加密后的密文为:", base64.StdEncoding.EncodeToString(cryptText))
//传入密文和自己定义的密钥需要和加密的密钥一样不一样会报错24字节如果不足24字节函数内部自动补全超过24字节函数内部截取
newplaintext := goEncrypt.TripleDesDecrypt(cryptText, []byte("wumansgy12345678asdfghjk"))
fmt.Println("三重DES的CBC模式解密完", string(newplaintext))
fmt.Println("明文为:", string(plaintext))
// 传入明文和自己定义的密钥密钥为24字节
cryptText, err := goEncrypt.TripleDesEncrypt(plaintext, []byte("wumansgy12345678asdfghjk"))
if err != nil {
fmt.Println(err)
}
fmt.Println("三重DES的CBC模式加密后的密文为:", base64.StdEncoding.EncodeToString(cryptText))
// 传入密文和自己定义的密钥,需要和加密的密钥一样,不一样会报错
newplaintext, err := goEncrypt.TripleDesDecrypt(cryptText, []byte("wumansgy12345678asdfghjk"))
if err != nil {
fmt.Println(err)
}
fmt.Println("三重DES的CBC模式解密完", string(newplaintext))
}
```
@@ -59,16 +71,22 @@ func main(){
```
func main(){
plaintext := []byte("床前明月光疑是地上霜举头望明月学习go语言")
fmt.Println("明文为:",string(plaintext))
//传入明文和自己定义的密钥密钥为16字节如果不足16字节函数内部自动补全超过16字节函数内部截取
cryptText := goEncrypt.AesCBC_Encrypt(plaintext, []byte("wumansgygoaescry"))
fmt.Println("AES的CBC模式加密后的密文为:", base64.StdEncoding.EncodeToString(cryptText))
//传入密文和自己定义的密钥需要和加密的密钥一样不一样会报错16字节如果不足16字节函数内部自动补全超过16字节函数内部截取
newplaintext := goEncrypt.AesCBC_Decrypt(cryptText, []byte("wumansgygoaescry"))
fmt.Println("AES的CBC模式解密完", string(newplaintext))
fmt.Println("明文为:",string(plaintext))
// 传入明文和自己定义的密钥密钥为16字节
cryptText,err := goEncrypt.AesCbcEncrypt(plaintext, []byte("wumansgygoaescry"))
if err!=nil{
fmt.Println(err)
}
fmt.Println("AES的CBC模式加密后的密文为:", base64.StdEncoding.EncodeToString(cryptText))
// 传入密文和自己定义的密钥,需要和加密的密钥一样,不一样会报错
newplaintext ,err:= goEncrypt.AesCbcDecrypt(cryptText, []byte("wumansgygoaescry"))
if err!=nil{
fmt.Println(err)
}
fmt.Println("AES的CBC模式解密完", string(newplaintext))
}
```
@@ -79,16 +97,22 @@ func main(){
```
func main(){
plaintext := []byte("床前明月光疑是地上霜举头望明月学习go语言")
fmt.Println("明文为:",string(plaintext))
//传入明文和自己定义的密钥密钥为16字节如果不足16字节函数内部自动补全超过16字节函数内部截取
cryptText := goEncrypt.AesCTR_Encrypt(plaintext, []byte("wumansgygoaesctr"))
fmt.Println("AES的CTR模式加密后的密文为:", base64.StdEncoding.EncodeToString(cryptText))
//传入密文和自己定义的密钥需要和加密的密钥一样不一样会报错16字节如果不足16字节函数内部自动补全超过16字节函数内部截取
newplaintext := goEncrypt.AesCTR_Decrypt(cryptText, []byte("wumansgygoaesctr"))
fmt.Println("AES的CTR模式解密完", string(newplaintext))
fmt.Println("明文为:",string(plaintext))
//传入明文和自己定义的密钥密钥为16字节
cryptText ,err:= goEncrypt.AesCtrEncrypt(plaintext, []byte("wumansgygoaesctr"))
if err!=nil{
fmt.Println(err)
}
fmt.Println("AES的CTR模式加密后的密文为:", base64.StdEncoding.EncodeToString(cryptText))
//传入密文和自己定义的密钥,需要和加密的密钥一样,不一样会报错
newplaintext ,err:= goEncrypt.AesCtrDecrypt(cryptText, []byte("wumansgygoaesctr"))
if err!=nil{
fmt.Println(err)
}
fmt.Println("AES的CTR模式解密完", string(newplaintext))
}
```
@@ -100,7 +124,7 @@ func main(){
#### 3.1 使用
先直接调用GetKet()就可以在本地生成一个私钥文件,一个公钥文件
先直接调用GetKey()就可以在本地生成一个私钥文件,一个公钥文件
```
func main() {
@@ -117,56 +141,59 @@ func main() {
#### 3.2 RSA加解密使用公钥加密私钥解密
```
func main() {
plaintext := []byte("床前明月光,疑是地上霜,举头望明月,低头学编程")
//把生成的文件里面复制过来,头和尾也需要,用反引号包含起来
privatekey := []byte(`-----BEGIN wuman private key-----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-----END wuman private key-----
`)
publickey := []byte(`-----BEGIN wuman public key-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzwD90zCxWsoV7in9XifM
YqZlWM9FUcbDDMqgYQJ06IAT+DJbw9yMdlw/bWYZ6usDkaKoShauXhafcWME0N6r
RubRfYT5K0Ye1pav+7HyEBOBihvWCc6XzOCd4Z5Zws9/ustqzdTTFQDrXDJGNZ1I
0PVa6ERYJFyFkyaIuhM1P29yat6/zWmkvkz91E6cJyLEKSbuWLeSz0zqYur77/+c
+A/xg9IimPjimwxFB/pjieBwDsq8/PRDfxgezhVCgZikKexp7fl4yEbqxrPbQgNw
ad6gP18x4SD9oHZEkQsMHADpGK57k6tNkxnnB+AlAjXOuzwXh/8Q0vN9FsSW++hW
/wIDAQAB
-----END wuman public key-----`)
const (
privateKey = `-----BEGIN WUMAN RSA PRIVATE KEY -----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-----END WUMAN RSA PRIVATE KEY -----`
publicKey = `-----BEGIN WUMAN RSA PUBLIC KEY -----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArDuxlkVpBB4zPoNzBh9F
0OLeR8kk/8/ewryuVlj2/SM5gLaNI8jXt1Fpc9nNBMZlqNttZyf+h0PA9N2QDLhh
LreB566m+H4TrobaRfrhe2ZQG/E28XuebqcWRLsqOBc/6ydywcpmk3JSlIMYCLzT
M1p1XlA1mrJPc7GlDKCRcUiPDn+nZ67n2dbXqrpDCykNh3gAFNIrD4vCuB5LEcW8
NLGMSBW8/zOxNdeC3S+8ni6HjXsjWft85zlcvoe0nGgsPITa0PGBSC/BIVZwYCW7
A0+CrDSvVGp9QPuQhdCyf6INduHpINzeoz7RS2rqoo0ERgctwn62vL7mOnubAruJ
nwIDAQAB
-----END WUMAN RSA PUBLIC KEY -----`
)
//直接传入明文和公钥加密得到密文
crypttext, err := goEncrypt.RsaEncrypt(plaintext, publickey)
func main() {
privateKey := []byte(privateKey)
publicKey := []byte(publicKey)
plaintext := []byte("床前明月光,疑是地上霜,举头望明月,低头学编程")
// 直接传入明文和公钥加密得到密文
crypttext, err := goEncrypt.RsaEncrypt(plaintext, publicKey)
if err != nil {
fmt.Println(err)
return
}
fmt.Println("密文", hex.EncodeToString(crypttext))
//解密操作,直接传入密文和私钥解密操作,得到明文
plaintext, err = goEncrypt.RsaDecrypt(crypttext, privatekey)
// 解密操作,直接传入密文和私钥解密操作,得到明文
plaintext, err = goEncrypt.RsaDecrypt(crypttext, privateKey)
if err != nil {
fmt.Println(err)
return
@@ -185,60 +212,63 @@ ad6gP18x4SD9oHZEkQsMHADpGK57k6tNkxnnB+AlAjXOuzwXh/8Q0vN9FsSW++hW
**快速实现**
```
func main(){
privateKey:=[]byte(`-----BEGIN WUMAN PRIVATE KEY-----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-----END WUMAN PRIVATE KEY-----
`)
publicKey:=[]byte(`-----BEGIN WUMAN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0Pmhu/ECgMytk5SxCVms
ntiSCv8wKvhCpTTX9DBWNFWYPk9+9M0m4FszP2dXoz2TfFi4JYhAWx0S558pAAE7
1RmEZ4juF0Ah7ESnXsMNqjh04yL+CnaYaPnJR6hpA1yuCoVmOmlDUQazJ5d+xc1S
Jt+hxpJBq/fqyCkMaXfAKKR/IWSYQ8csKeSdQfXkf01vjTr0FniCwBEn8QaWin0l
tX+sB2YRfrPNPAYc0LcjUCVs+OX8qeEthgZj+MAEJe5KE6d2BaXXEPQBuTClXfG+
LuQ+kK5350RFfwe1YH6a/Mjun9g0z0Faljf96n4JvCIruHoGUUXOadIlaLRFfXvF
JwIDAQAB
-----END WUMAN PUBLIC KEY-----`)
msg:=[]byte("RSA数字签名测试")
signmsg,err:=goEncrypt.RsaSign(msg,privateKey)
if err!=nil{
const (
privateKey = `-----BEGIN WUMAN RSA PRIVATE KEY -----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-----END WUMAN RSA PRIVATE KEY -----`
publicKey = `-----BEGIN WUMAN RSA PUBLIC KEY -----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArDuxlkVpBB4zPoNzBh9F
0OLeR8kk/8/ewryuVlj2/SM5gLaNI8jXt1Fpc9nNBMZlqNttZyf+h0PA9N2QDLhh
LreB566m+H4TrobaRfrhe2ZQG/E28XuebqcWRLsqOBc/6ydywcpmk3JSlIMYCLzT
M1p1XlA1mrJPc7GlDKCRcUiPDn+nZ67n2dbXqrpDCykNh3gAFNIrD4vCuB5LEcW8
NLGMSBW8/zOxNdeC3S+8ni6HjXsjWft85zlcvoe0nGgsPITa0PGBSC/BIVZwYCW7
A0+CrDSvVGp9QPuQhdCyf6INduHpINzeoz7RS2rqoo0ERgctwn62vL7mOnubAruJ
nwIDAQAB
-----END WUMAN RSA PUBLIC KEY -----`
)
func main() {
privateKey := []byte(privateKey)
publicKey := []byte(publicKey)
msg := []byte("RSA数字签名测试")
signmsg, err := goEncrypt.RsaSign(msg, privateKey)
if err != nil {
fmt.Println(err)
return
}
fmt.Println("RSA数字签名的消息为",hex.EncodeToString(signmsg))
fmt.Println("RSA数字签名的消息为", hex.EncodeToString(signmsg))
//验证数字签名正不正确
result:=goEncrypt.RsaVerifySign(msg,signmsg,publicKey)
if result{ //如果result返回的是true那么就是本人签名否则不是只有私钥加密相对的公钥验证才可以认为是本人
// 验证数字签名正不正确
result := goEncrypt.RsaVerifySign(msg, signmsg, publicKey)
if result { // 如果result返回的是 true 那么就是本人签名,否则不是,只有私钥加密,相对的公钥验证才可以认为是本人
fmt.Println("RSA数字签名正确是本人")
}else{
} else {
fmt.Println("RSA数字签名错误不是本人")
}
}
```
@@ -246,7 +276,7 @@ JwIDAQAB
## 4.ECC椭圆曲线应用
**GO里面只有ECC数字签名的接口所以我们这里实现一下ECC的数字签名功能后期再把ECC椭圆曲线加密的函数封装好上传**
**GO里面只有ECC数字签名的接口所以我们这里实现ECC的数字签名功能ECC椭圆曲线加密使用了区块链以太坊中的相关接口,ECC一般只签名使用加密一般不使用**
#### 4.1 ECC使用
@@ -267,30 +297,34 @@ func main(){
#### 4.2 ECC数字签名快速使用实现
```
func main(){
privateKey:=[]byte(`-----BEGIN WUMAN ECC PRIVATE KEY-----
MIHcAgEBBEIAZEdmSEQlu9jHzVTOHzGnQOhGNtj79Z/Hu14bYb7SidfyCS39ITZ4
ShSJ4E5OfXcXI2eXTX9jQb/BPbufumLxdf2gBwYFK4EEACOhgYkDgYYABAEAmpB3
ckiCr/9GIj6ujTs9fl7K2kBaM+0MhAnFDcCe8VtBqgn7SC860WxHyNFVUPaUvABC
ytMOTf4v9m+aEaHONwA2xf/V35oCMAiVKwx9kovR42m/0XRPEpbuocaIflVDdQK9
6BDdzYQrU+s/GL3TXxBE+L1b9+c5ZfJdDsMHXqMxJA==
-----END WUMAN ECC PRIVATE KEY-----`)
publicKey:=[]byte(`-----BEGIN WUMAN ECC PUBLIC KEY-----
MIGbMBAGByqGSM49AgEGBSuBBAAjA4GGAAQBAJqQd3JIgq//RiI+ro07PX5eytpA
WjPtDIQJxQ3AnvFbQaoJ+0gvOtFsR8jRVVD2lLwAQsrTDk3+L/ZvmhGhzjcANsX/
1d+aAjAIlSsMfZKL0eNpv9F0TxKW7qHGiH5VQ3UCvegQ3c2EK1PrPxi9018QRPi9
W/fnOWXyXQ7DB16jMSQ=
-----END WUMAN ECC PUBLIC KEY-----`)
msg:=[]byte("数字签名测试")
rtext,stext:=goEncrypt.EccSign(msg,privateKey)
const (
privateKey = `-----BEGIN WUMAN ECC PRIVATE KEY-----
MHcCAQEEIKozbXD9G6bGPJ26cCAfEdLrqAe697F8SiLRMdqxzNQ5oAoGCCqGSM49
AwEHoUQDQgAEk3/hltyR0r0J2Wkkhi4HaREJXS1vFooGpsKCbLvrdUW4peVIwKEW
+yC3/g2X7Q2A8ftJlYv2X4kDU180GhIQpA==
-----END WUMAN ECC PRIVATE KEY-----`
publicKey = `-----BEGIN WUMAN ECC PUBLIC KEY-----
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEk3/hltyR0r0J2Wkkhi4HaREJXS1v
FooGpsKCbLvrdUW4peVIwKEW+yC3/g2X7Q2A8ftJlYv2X4kDU180GhIQpA==
-----END WUMAN ECC PUBLIC KEY-----`
)
fmt.Println("数字签名的消息为:",hex.EncodeToString(rtext)+hex.EncodeToString(stext))
func main() {
privateKey := []byte(privateKey)
publicKey := []byte(publicKey)
msg := []byte("数字签名测试")
rtext, stext, err := goEncrypt.EccSign(msg, privateKey)
if err != nil {
fmt.Println(err)
}
//验证数字签名正不正确
result:=goEncrypt.EccVerifySign(msg,publicKey,rtext,stext)
if result{ //如果result返回的是true那么就是本人签名否则不是只有私钥加密相对的公钥验证才可以认为是本人
fmt.Println("数字签名的消息为:", hex.EncodeToString(rtext)+hex.EncodeToString(stext))
// 验证数字签名正不正确
result := goEncrypt.EccVerifySign(msg, publicKey, rtext, stext)
if result { // 如果result返回的是true那么就是本人签名否则不是只有私钥加密相对的公钥验证才可以认为是本人
fmt.Println("数字签名正确,是本人")
}else{
} else {
fmt.Println("数字签名错误,不是本人")
}
}
@@ -300,47 +334,48 @@ W/fnOWXyXQ7DB16jMSQ=
> ECC椭圆曲线技术应用广泛目前我国居民身份证数字签名技术就是使用的ECC虚拟货币比特币和以太坊中也使用了ECC技术后面我们会把ECC加密的方法也实现好。
#### 4.3 ECC用作加密非对称加密是用公钥来加密私钥来解密的由于GO标准包中没有实现ECC加密的接口只实现了ECC数字签名的接口我们找了以太坊源码中的ECC加密的使用方法稍加改造了一下拿过来用了在这里调用了以太坊加密包里面的接口来实现ECC加密的方法我们把加密的东西二次封装了一下下载包后就可以直接使用
#### 4.3 ECC用作加密使非对称加密是用公钥来加密私钥来解密的由于GO标准包中没有实现ECC加密的接口只实现了ECC数字签名的接口我们找了以太坊源码中的ECC加密的使用方法稍加改造了一下拿过来用了在这里调用了以太坊加密包里面的接口来实现ECC加密的方法我们把加密的东西二次封装了一下下载包后就可以直接使用
首先还是先得到公钥和私钥
```
func main(){
goEncrypt.GetEccKey()
} //这里我们得到的密钥是通过P256曲线得到的由于之前验证用别的曲线调用以太坊接口会报错
} // 这里我们得到的密钥是通过P256曲线得到的由于之前验证用别的曲线调用以太坊接口会报错
```
然后就可以快速使用了
```
func main(){
plainText:=[]byte("窗前明月光,疑是地上霜,ECC加密解密")
//这里传入的私钥和公钥是要用GetECCKey里面得到的私钥和公钥如果自己封装的话
// 获取密钥时传入的第一个参数是要用这条曲线elliptic.P256(),如果用别的会报无效公钥错误,
// 例如用P521()这条曲线
privateKey:=[]byte(`-----BEGIN WUMAN ECC PRIVATE KEY-----
const (
privateKey = `-----BEGIN WUMAN ECC PRIVATE KEY-----
MHcCAQEEIKozbXD9G6bGPJ26cCAfEdLrqAe697F8SiLRMdqxzNQ5oAoGCCqGSM49
AwEHoUQDQgAEk3/hltyR0r0J2Wkkhi4HaREJXS1vFooGpsKCbLvrdUW4peVIwKEW
+yC3/g2X7Q2A8ftJlYv2X4kDU180GhIQpA==
-----END WUMAN ECC PRIVATE KEY-----
`)
publicKey:=[]byte(`-----BEGIN WUMAN ECC PUBLIC KEY-----
-----END WUMAN ECC PRIVATE KEY-----`
publicKey = `-----BEGIN WUMAN ECC PUBLIC KEY-----
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEk3/hltyR0r0J2Wkkhi4HaREJXS1v
FooGpsKCbLvrdUW4peVIwKEW+yC3/g2X7Q2A8ftJlYv2X4kDU180GhIQpA==
-----END WUMAN ECC PUBLIC KEY-----
`)
-----END WUMAN ECC PUBLIC KEY-----`
)
cryptText,_:=goEncrypt.EccPublicEncrypt(plainText,publicKey)
fmt.Println("ECC传入公钥加密的密文为",hex.EncodeToString(cryptText))
func main() {
plainText := []byte("窗前明月光,疑是地上霜,ECC加密解密")
msg,err:=goEncrypt.EccPrivateDeCrypt(cryptText,privateKey)
if err!=nil{
// 这里传入的私钥和公钥是要用GetECCKey里面得到的私钥和公钥如果自己封装的话
// 获取密钥时传入的第一个参数是要用这条曲线elliptic.P256(),如果用别的会报无效公钥错误,
// 例如用P521()这条曲线
privateKey := []byte(privateKey)
publicKey := []byte(publicKey)
cryptText, _ := goEncrypt.EccEncrypt(plainText, publicKey)
fmt.Println("ECC传入公钥加密的密文为", hex.EncodeToString(cryptText))
msg, err := goEncrypt.EccDecrypt(cryptText, privateKey)
if err != nil {
fmt.Println(err)
}
fmt.Println("ECC传入私钥解密后的明文为",string(msg))
fmt.Println("ECC传入私钥解密后的明文为", string(msg))
}
```
@@ -351,19 +386,10 @@ FooGpsKCbLvrdUW4peVIwKEW+yC3/g2X7Q2A8ftJlYv2X4kDU180GhIQpA==
#### 5.1 sh256的快速使用
```
func main(){
//获取文件哈希的时候,需要传入文件的路径就行了,如果传入文件夹会报错
fileHash,err:=goEncrypt.GetFileStringHash256("D:/gocode/播放器.zip")
if err!=nil{
fmt.Println(err)
return
}
fmt.Println("文件的哈希为:",fileHash)
//得到普通字符串哈希直接传入字符串就行
Hash:=goEncrypt.GetStringHash256("得到普通哈希")
fmt.Println("普通字符串哈希:",Hash)
func main() {
// sha256 和 sha256Hex
hash := goEncrypt.Sha256Hex([]byte("test"))
fmt.Println(hash)
}
```
@@ -372,33 +398,13 @@ func main(){
#### 5.2 sha512的快速使用
```
func main(){
//获取文件哈希的时候,需要传入文件的路径就行了,如果传入文件夹会报错
fileHash,err:=goEncrypt.GetFileStringHash512("D:/gocode/播放器.zip")
if err!=nil{
fmt.Println(err)
return
}
fmt.Println("文件的哈希为:",fileHash)
//得到普通字符串哈希直接传入字符串就行
Hash:=goEncrypt.GetStringHash512("得到普通哈希")
fmt.Println("普通字符串哈希:",Hash)
func main() {
// sha512 和 sha512Hex
hash := goEncrypt.Sha512Hex([]byte("test"))
fmt.Println(hash)
}
```
![](image/10.png)
#### 5.3 上面两个函数内部已经转换为16进制的字符串了如果需要返回哈希切片[]byte类型用下面两个函数就行了
```
func main(){
goEncrypt.GetFileHash256
goEncrypt.GetFileHash512
goEncrypt.GetHash256
goEncrypt.GetHash512
} //用这几个函数就可以了,得到的就是哈希的[]byte类型
```