aboutsummaryrefslogtreecommitdiff
path: root/main.go
diff options
context:
space:
mode:
authorRunxi Yu <me@runxiyu.org>2025-03-23 04:14:08 +0800
committerRunxi Yu <me@runxiyu.org>2025-03-23 04:14:08 +0800
commitbeeeba8eb2bc03ebabec5bc9541b6ed919f093ad (patch)
tree8e6003eb441370a755483b3489d515110373773f /main.go
parentUpdate README (diff)
downloadpowxy-beeeba8eb2bc03ebabec5bc9541b6ed919f093ad.tar.gz
powxy-beeeba8eb2bc03ebabec5bc9541b6ed919f093ad.tar.zst
powxy-beeeba8eb2bc03ebabec5bc9541b6ed919f093ad.zip
Reformat
Diffstat (limited to '')
-rw-r--r--main.go12
1 files changed, 6 insertions, 6 deletions
diff --git a/main.go b/main.go
index c259684..cf495e8 100644
--- a/main.go
+++ b/main.go
@@ -1,8 +1,8 @@
package main
import (
- "crypto/rand"
"crypto/hmac"
+ "crypto/rand"
"crypto/sha256"
"crypto/subtle"
"encoding/base64"
@@ -125,7 +125,7 @@ func main() {
if !ok {
authPage("")
return
- } else if len(formValues) != 1 {
+ } else if len(formValues) != 1 {
authPage("You submitted an invalid number of form values.")
return
}
@@ -144,7 +144,7 @@ func main() {
authPage("Your submission was incorrect.")
return
}
-
+
http.SetCookie(writer, &http.Cookie{
Name: "powxy",
Value: base64.StdEncoding.EncodeToString(expectedToken),
@@ -167,10 +167,10 @@ func validateCookie(cookie *http.Cookie, expectedToken []byte) bool {
return subtle.ConstantTimeCompare(gotToken, expectedToken) == 1
}
func makeSignedToken(request *http.Request) []byte {
- buf := make([]byte, 0, 2 * sha256.Size)
+ buf := make([]byte, 0, 2*sha256.Size)
timeBuf := make([]byte, binary.MaxVarintLen64)
- binary.PutVarint(timeBuf, time.Now().Unix() / 604800)
+ binary.PutVarint(timeBuf, time.Now().Unix()/604800)
remoteAddr, _, _ := strings.Cut(request.RemoteAddr, ":")
@@ -189,7 +189,7 @@ func makeSignedToken(request *http.Request) []byte {
mac := hmac.New(sha256.New, privkey)
mac.Write(buf)
buf = mac.Sum(buf)
- if len(buf) != 2 * sha256.Size {
+ if len(buf) != 2*sha256.Size {
panic("unexpected buffer length after hmac")
}