You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					89 lines
				
				3.0 KiB
			
		
		
			
		
	
	
					89 lines
				
				3.0 KiB
			| 
											3 years ago
										 | // Copyright 2015 Joyent, Inc.
 | ||
|  | 
 | ||
|  | var assert = require('assert-plus'); | ||
|  | var crypto = require('crypto'); | ||
|  | var sshpk = require('sshpk'); | ||
|  | var utils = require('./utils'); | ||
|  | 
 | ||
|  | var HASH_ALGOS = utils.HASH_ALGOS; | ||
|  | var PK_ALGOS = utils.PK_ALGOS; | ||
|  | var InvalidAlgorithmError = utils.InvalidAlgorithmError; | ||
|  | var HttpSignatureError = utils.HttpSignatureError; | ||
|  | var validateAlgorithm = utils.validateAlgorithm; | ||
|  | 
 | ||
|  | ///--- Exported API
 | ||
|  | 
 | ||
|  | module.exports = { | ||
|  |   /** | ||
|  |    * Verify RSA/DSA signature against public key.  You are expected to pass in | ||
|  |    * an object that was returned from `parse()`. | ||
|  |    * | ||
|  |    * @param {Object} parsedSignature the object you got from `parse`. | ||
|  |    * @param {String} pubkey RSA/DSA private key PEM. | ||
|  |    * @return {Boolean} true if valid, false otherwise. | ||
|  |    * @throws {TypeError} if you pass in bad arguments. | ||
|  |    * @throws {InvalidAlgorithmError} | ||
|  |    */ | ||
|  |   verifySignature: function verifySignature(parsedSignature, pubkey) { | ||
|  |     assert.object(parsedSignature, 'parsedSignature'); | ||
|  |     if (typeof (pubkey) === 'string' || Buffer.isBuffer(pubkey)) | ||
|  |       pubkey = sshpk.parseKey(pubkey); | ||
|  |     assert.ok(sshpk.Key.isKey(pubkey, [1, 1]), 'pubkey must be a sshpk.Key'); | ||
|  | 
 | ||
|  |     var alg = validateAlgorithm(parsedSignature.algorithm); | ||
|  |     if (alg[0] === 'hmac' || alg[0] !== pubkey.type) | ||
|  |       return (false); | ||
|  | 
 | ||
|  |     var v = pubkey.createVerify(alg[1]); | ||
|  |     v.update(parsedSignature.signingString); | ||
|  |     return (v.verify(parsedSignature.params.signature, 'base64')); | ||
|  |   }, | ||
|  | 
 | ||
|  |   /** | ||
|  |    * Verify HMAC against shared secret.  You are expected to pass in an object | ||
|  |    * that was returned from `parse()`. | ||
|  |    * | ||
|  |    * @param {Object} parsedSignature the object you got from `parse`. | ||
|  |    * @param {String} secret HMAC shared secret. | ||
|  |    * @return {Boolean} true if valid, false otherwise. | ||
|  |    * @throws {TypeError} if you pass in bad arguments. | ||
|  |    * @throws {InvalidAlgorithmError} | ||
|  |    */ | ||
|  |   verifyHMAC: function verifyHMAC(parsedSignature, secret) { | ||
|  |     assert.object(parsedSignature, 'parsedHMAC'); | ||
|  |     assert.string(secret, 'secret'); | ||
|  | 
 | ||
|  |     var alg = validateAlgorithm(parsedSignature.algorithm); | ||
|  |     if (alg[0] !== 'hmac') | ||
|  |       return (false); | ||
|  | 
 | ||
|  |     var hashAlg = alg[1].toUpperCase(); | ||
|  | 
 | ||
|  |     var hmac = crypto.createHmac(hashAlg, secret); | ||
|  |     hmac.update(parsedSignature.signingString); | ||
|  | 
 | ||
|  |     /* | ||
|  |      * Now double-hash to avoid leaking timing information - there's | ||
|  |      * no easy constant-time compare in JS, so we use this approach | ||
|  |      * instead. See for more info: | ||
|  |      * https://www.isecpartners.com/blog/2011/february/double-hmac-
 | ||
|  |      * verification.aspx | ||
|  |      */ | ||
|  |     var h1 = crypto.createHmac(hashAlg, secret); | ||
|  |     h1.update(hmac.digest()); | ||
|  |     h1 = h1.digest(); | ||
|  |     var h2 = crypto.createHmac(hashAlg, secret); | ||
|  |     h2.update(new Buffer(parsedSignature.params.signature, 'base64')); | ||
|  |     h2 = h2.digest(); | ||
|  | 
 | ||
|  |     /* Node 0.8 returns strings from .digest(). */ | ||
|  |     if (typeof (h1) === 'string') | ||
|  |       return (h1 === h2); | ||
|  |     /* And node 0.10 lacks the .equals() method on Buffers. */ | ||
|  |     if (Buffer.isBuffer(h1) && !h1.equals) | ||
|  |       return (h1.toString('binary') === h2.toString('binary')); | ||
|  | 
 | ||
|  |     return (h1.equals(h2)); | ||
|  |   } | ||
|  | }; |