blob: 6da0e7c1a27a4b1804fb44266356dc9dfcb1c042 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
|
// SPDX-License-Identifier: BSD-2-Clause
// SPDX-FileCopyrightText: Copyright (c) 2025 Runxi Yu <https://runxiyu.org>
package main
import (
"crypto/hmac"
"crypto/sha256"
"encoding/binary"
"net/http"
"time"
)
func makeIdentifierMAC(request *http.Request) (identifier []byte, mac []byte) {
identifier = make([]byte, 0, sha256.Size)
mac = make([]byte, 0, sha256.Size)
timeBuf := make([]byte, binary.MaxVarintLen64)
binary.PutVarint(timeBuf, time.Now().Unix()/604800)
remoteIP := getRemoteIP(request)
h := sha256.New()
h.Write(timeBuf)
h.Write(stringToBytes(remoteIP))
h.Write(stringToBytes(request.Header.Get("User-Agent")))
h.Write(stringToBytes(request.Header.Get("Accept-Encoding")))
h.Write(stringToBytes(request.Header.Get("Accept-Language")))
h.Write(privkeyHash)
identifier = h.Sum(identifier)
if len(identifier) != sha256.Size {
panic("unexpected buffer length after hashing contents")
}
m := hmac.New(sha256.New, privkey)
m.Write(identifier)
mac = m.Sum(mac)
if len(mac) != sha256.Size {
panic("unexpected buffer length after hmac")
}
return
}
|