-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy pathapi_key.go
120 lines (104 loc) · 2.54 KB
/
api_key.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
package main
import (
"crypto/aes"
"crypto/cipher"
"crypto/rand"
"crypto/sha256"
"encoding/base64"
"encoding/hex"
"encoding/json"
"fmt"
"io"
"net"
"net/http"
)
// generate unique encryption key
func getEncryptionKey() {
decodedSeed, err := base64.StdEncoding.DecodeString(base64StaticSeedKey)
if err != nil {
fmt.Printf("Error decoding Base64 static seed key: %v\n", err)
return
}
staticSeedKey := string(decodedSeed)
interfaces, err := net.Interfaces()
if err != nil || len(interfaces) == 0 {
hash := sha256.Sum256([]byte(staticSeedKey))
encryptionKey = hex.EncodeToString(hash[:])
return
}
var macAddr string
for _, i := range interfaces {
if i.HardwareAddr != nil && len(i.HardwareAddr.String()) > 0 {
macAddr = i.HardwareAddr.String()
break
}
}
seed := macAddr + staticSeedKey
hash := sha256.Sum256([]byte(seed))
encryptionKey = hex.EncodeToString(hash[:])
}
// encrypt key file
func encrypt(data []byte, passphrase string) ([]byte, error) {
block, err := aes.NewCipher(getSHA256Hash(passphrase))
if err != nil {
return nil, err
}
gcm, err := cipher.NewGCM(block)
if err != nil {
return nil, err
}
nonce := make([]byte, gcm.NonceSize())
if _, err := io.ReadFull(rand.Reader, nonce); err != nil {
return nil, err
}
ciphertext := gcm.Seal(nonce, nonce, data, nil)
return ciphertext, nil
}
// decrypt key file
func decrypt(data []byte, passphrase string) ([]byte, error) {
key := getSHA256Hash(passphrase)
block, err := aes.NewCipher(key)
if err != nil {
return nil, err
}
gcm, err := cipher.NewGCM(block)
if err != nil {
return nil, err
}
nonceSize := gcm.NonceSize()
nonce, ciphertext := data[:nonceSize], data[nonceSize:]
plaintext, err := gcm.Open(nil, nonce, ciphertext, nil)
if err != nil {
return nil, err
}
return plaintext, nil
}
// sha256Hash function for encrypt /decrypt file func
func getSHA256Hash(text string) []byte {
hash := sha256.Sum256([]byte(text))
return hash[:]
}
// verify hashes.com API key
func verifyAPIKey(apiKey string) bool {
url := fmt.Sprintf("https://hashes.com/en/api/balance?key=%s", apiKey)
resp, err := http.Get(url)
if err != nil {
fmt.Printf("Failed to send request: %v\n", err)
return false
}
defer resp.Body.Close()
var response struct {
Success bool `json:"success"`
}
err = json.NewDecoder(resp.Body).Decode(&response)
if err != nil {
fmt.Printf("Failed to decode response: %v\n", err)
return false
}
if response.Success {
fmt.Println("API key verified")
return true
}
//fmt.Println("API key not verified, try again")
return false
}