aboutsummaryrefslogtreecommitdiffstats
path: root/cmd/userkey/main.go
blob: 5ecd5f1b88f4127d19e810ca42bc86823b2f47c8 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
package main

import (
	"crypto/hmac"
	"crypto/sha256"
	"encoding/hex"
	"fmt"
	"io/ioutil"
	"log"
	"os"
)

func main() {
	user := os.Args[1]
	if len(user) < 3 {
		log.Fatalf("User name argument expected.")
	}
	encoded, err := ioutil.ReadAll(os.Stdin)
	if err != nil || len(encoded) == 0 {
		log.Fatalf("Expected exactly 1 secret")
	}
	sk, err := hex.DecodeString(string(encoded))
	if err != nil || len(sk) < 32 {
		log.Fatalf("hex.DecodeString() = %d, %v", len(sk), err)
		return
	}
	mac := hmac.New(sha256.New, sk)
	mac.Write([]byte(user))
	fmt.Println(hex.EncodeToString(mac.Sum(nil)))
}

// ValidMAC reports whether messageMAC is a valid HMAC tag for message.
func ValidMAC(message, messageMAC, key []byte) bool {
	mac := hmac.New(sha256.New, key)
	mac.Write(message)
	expectedMAC := mac.Sum(nil)
	return hmac.Equal(messageMAC, expectedMAC)
}

var sk []byte