Add four new infrastructure packages with CLI commands: - pkg/config: layered configuration (defaults → file → env → flags) - pkg/crypt: crypto primitives (Argon2id, AES-GCM, ChaCha20, HMAC, checksums) - pkg/plugin: plugin system with GitHub-based install/update/remove - pkg/collect: collection subsystem (GitHub, BitcoinTalk, market, papers, excavate) Fix all golangci-lint issues across the entire codebase (~100 errcheck, staticcheck SA1012/SA1019/ST1005, unused, ineffassign fixes) so that `core go qa` passes with 0 issues. Closes #167, #168, #170, #250, #251, #252, #253, #254, #255, #256 Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
40 lines
895 B
Go
40 lines
895 B
Go
package crypt
|
|
|
|
import (
|
|
"crypto/sha256"
|
|
"encoding/hex"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestHMACSHA256_Good(t *testing.T) {
|
|
// RFC 4231 Test Case 2
|
|
key := []byte("Jefe")
|
|
message := []byte("what do ya want for nothing?")
|
|
expected := "5bdcc146bf60754e6a042426089575c75a003f089d2739839dec58b964ec3843"
|
|
|
|
mac := HMACSHA256(message, key)
|
|
assert.Equal(t, expected, hex.EncodeToString(mac))
|
|
}
|
|
|
|
func TestVerifyHMAC_Good(t *testing.T) {
|
|
key := []byte("secret-key")
|
|
message := []byte("test message")
|
|
|
|
mac := HMACSHA256(message, key)
|
|
|
|
valid := VerifyHMAC(message, key, mac, sha256.New)
|
|
assert.True(t, valid)
|
|
}
|
|
|
|
func TestVerifyHMAC_Bad(t *testing.T) {
|
|
key := []byte("secret-key")
|
|
message := []byte("test message")
|
|
tampered := []byte("tampered message")
|
|
|
|
mac := HMACSHA256(message, key)
|
|
|
|
valid := VerifyHMAC(tampered, key, mac, sha256.New)
|
|
assert.False(t, valid)
|
|
}
|