blob: 5ecd5f1b88f4127d19e810ca42bc86823b2f47c8 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
|
package main
import (
"crypto/hmac"
"crypto/sha256"
"encoding/hex"
"fmt"
"io/ioutil"
"log"
"os"
)
func main() {
user := os.Args[1]
if len(user) < 3 {
log.Fatalf("User name argument expected.")
}
encoded, err := ioutil.ReadAll(os.Stdin)
if err != nil || len(encoded) == 0 {
log.Fatalf("Expected exactly 1 secret")
}
sk, err := hex.DecodeString(string(encoded))
if err != nil || len(sk) < 32 {
log.Fatalf("hex.DecodeString() = %d, %v", len(sk), err)
return
}
mac := hmac.New(sha256.New, sk)
mac.Write([]byte(user))
fmt.Println(hex.EncodeToString(mac.Sum(nil)))
}
// ValidMAC reports whether messageMAC is a valid HMAC tag for message.
func ValidMAC(message, messageMAC, key []byte) bool {
mac := hmac.New(sha256.New, key)
mac.Write(message)
expectedMAC := mac.Sum(nil)
return hmac.Equal(messageMAC, expectedMAC)
}
var sk []byte
|