/
main.go
62 lines (46 loc) · 1.14 KB
/
main.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
package main
import (
"crypto/hmac"
"crypto/sha512"
"fmt"
"log"
"golang.org/x/crypto/bcrypt"
)
var key = []byte{}
func main() {
for i := 1; i <= 64; i++ {
key = append(key, byte(i))
}
pass := "123456789"
hashedPass, err := hashPassword(pass)
if err != nil {
panic(err)
}
fmt.Println("Hash: ", hashedPass)
if err := comparePassword(pass, hashedPass); err != nil {
log.Fatalln("Incorrect password")
}
fmt.Println("Logged in")
}
func hashPassword(password string) ([]byte, error) {
return bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)
}
func comparePassword(password string, hashedPassword []byte) error {
return bcrypt.CompareHashAndPassword(hashedPassword, []byte(password))
}
func signMessage(msg []byte) ([]byte, error) {
h := hmac.New(sha512.New, key)
_, err := h.Write(msg)
if err != nil {
return nil, fmt.Errorf("Error while hashing msgs: %w", err)
}
signature := h.Sum(nil)
return signature, nil
}
func checkSignature(msg, sig []byte) (bool, error) {
newSig, err := signMessage(msg)
if err != nil {
return false, fmt.Errorf("Error in checkSig: %w", err)
}
return hmac.Equal(newSig, sig), nil
}