Add four new infrastructure packages with CLI commands: - pkg/config: layered configuration (defaults → file → env → flags) - pkg/crypt: crypto primitives (Argon2id, AES-GCM, ChaCha20, HMAC, checksums) - pkg/plugin: plugin system with GitHub-based install/update/remove - pkg/collect: collection subsystem (GitHub, BitcoinTalk, market, papers, excavate) Fix all golangci-lint issues across the entire codebase (~100 errcheck, staticcheck SA1012/SA1019/ST1005, unused, ineffassign fixes) so that `core go qa` passes with 0 issues. Closes #167, #168, #170, #250, #251, #252, #253, #254, #255, #256 Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
30 lines
775 B
Go
30 lines
775 B
Go
package crypt
|
|
|
|
import (
|
|
"crypto/hmac"
|
|
"crypto/sha256"
|
|
"crypto/sha512"
|
|
"hash"
|
|
)
|
|
|
|
// HMACSHA256 computes the HMAC-SHA256 of a message using the given key.
|
|
func HMACSHA256(message, key []byte) []byte {
|
|
mac := hmac.New(sha256.New, key)
|
|
mac.Write(message)
|
|
return mac.Sum(nil)
|
|
}
|
|
|
|
// HMACSHA512 computes the HMAC-SHA512 of a message using the given key.
|
|
func HMACSHA512(message, key []byte) []byte {
|
|
mac := hmac.New(sha512.New, key)
|
|
mac.Write(message)
|
|
return mac.Sum(nil)
|
|
}
|
|
|
|
// VerifyHMAC verifies an HMAC using constant-time comparison.
|
|
// hashFunc should be sha256.New, sha512.New, etc.
|
|
func VerifyHMAC(message, key, mac []byte, hashFunc func() hash.Hash) bool {
|
|
expected := hmac.New(hashFunc, key)
|
|
expected.Write(message)
|
|
return hmac.Equal(mac, expected.Sum(nil))
|
|
}
|