You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							88 lines
						
					
					
						
							3.0 KiB
						
					
					
				
			
		
		
	
	
							88 lines
						
					
					
						
							3.0 KiB
						
					
					
				// Copyright 2015 Joyent, Inc. | 
						|
 | 
						|
var assert = require('assert-plus'); | 
						|
var crypto = require('crypto'); | 
						|
var sshpk = require('sshpk'); | 
						|
var utils = require('./utils'); | 
						|
 | 
						|
var HASH_ALGOS = utils.HASH_ALGOS; | 
						|
var PK_ALGOS = utils.PK_ALGOS; | 
						|
var InvalidAlgorithmError = utils.InvalidAlgorithmError; | 
						|
var HttpSignatureError = utils.HttpSignatureError; | 
						|
var validateAlgorithm = utils.validateAlgorithm; | 
						|
 | 
						|
///--- Exported API | 
						|
 | 
						|
module.exports = { | 
						|
  /** | 
						|
   * Verify RSA/DSA signature against public key.  You are expected to pass in | 
						|
   * an object that was returned from `parse()`. | 
						|
   * | 
						|
   * @param {Object} parsedSignature the object you got from `parse`. | 
						|
   * @param {String} pubkey RSA/DSA private key PEM. | 
						|
   * @return {Boolean} true if valid, false otherwise. | 
						|
   * @throws {TypeError} if you pass in bad arguments. | 
						|
   * @throws {InvalidAlgorithmError} | 
						|
   */ | 
						|
  verifySignature: function verifySignature(parsedSignature, pubkey) { | 
						|
    assert.object(parsedSignature, 'parsedSignature'); | 
						|
    if (typeof (pubkey) === 'string' || Buffer.isBuffer(pubkey)) | 
						|
      pubkey = sshpk.parseKey(pubkey); | 
						|
    assert.ok(sshpk.Key.isKey(pubkey, [1, 1]), 'pubkey must be a sshpk.Key'); | 
						|
 | 
						|
    var alg = validateAlgorithm(parsedSignature.algorithm); | 
						|
    if (alg[0] === 'hmac' || alg[0] !== pubkey.type) | 
						|
      return (false); | 
						|
 | 
						|
    var v = pubkey.createVerify(alg[1]); | 
						|
    v.update(parsedSignature.signingString); | 
						|
    return (v.verify(parsedSignature.params.signature, 'base64')); | 
						|
  }, | 
						|
 | 
						|
  /** | 
						|
   * Verify HMAC against shared secret.  You are expected to pass in an object | 
						|
   * that was returned from `parse()`. | 
						|
   * | 
						|
   * @param {Object} parsedSignature the object you got from `parse`. | 
						|
   * @param {String} secret HMAC shared secret. | 
						|
   * @return {Boolean} true if valid, false otherwise. | 
						|
   * @throws {TypeError} if you pass in bad arguments. | 
						|
   * @throws {InvalidAlgorithmError} | 
						|
   */ | 
						|
  verifyHMAC: function verifyHMAC(parsedSignature, secret) { | 
						|
    assert.object(parsedSignature, 'parsedHMAC'); | 
						|
    assert.string(secret, 'secret'); | 
						|
 | 
						|
    var alg = validateAlgorithm(parsedSignature.algorithm); | 
						|
    if (alg[0] !== 'hmac') | 
						|
      return (false); | 
						|
 | 
						|
    var hashAlg = alg[1].toUpperCase(); | 
						|
 | 
						|
    var hmac = crypto.createHmac(hashAlg, secret); | 
						|
    hmac.update(parsedSignature.signingString); | 
						|
 | 
						|
    /* | 
						|
     * Now double-hash to avoid leaking timing information - there's | 
						|
     * no easy constant-time compare in JS, so we use this approach | 
						|
     * instead. See for more info: | 
						|
     * https://www.isecpartners.com/blog/2011/february/double-hmac- | 
						|
     * verification.aspx | 
						|
     */ | 
						|
    var h1 = crypto.createHmac(hashAlg, secret); | 
						|
    h1.update(hmac.digest()); | 
						|
    h1 = h1.digest(); | 
						|
    var h2 = crypto.createHmac(hashAlg, secret); | 
						|
    h2.update(new Buffer(parsedSignature.params.signature, 'base64')); | 
						|
    h2 = h2.digest(); | 
						|
 | 
						|
    /* Node 0.8 returns strings from .digest(). */ | 
						|
    if (typeof (h1) === 'string') | 
						|
      return (h1 === h2); | 
						|
    /* And node 0.10 lacks the .equals() method on Buffers. */ | 
						|
    if (Buffer.isBuffer(h1) && !h1.equals) | 
						|
      return (h1.toString('binary') === h2.toString('binary')); | 
						|
 | 
						|
    return (h1.equals(h2)); | 
						|
  } | 
						|
};
 | 
						|
 |