verify.js 1.8 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
  1. var SEA = require('./root');
  2. var shim = require('./shim');
  3. var S = require('./settings');
  4. var sha256hash = require('./sha256');
  5. var parse = require('./parse');
  6. var u;
  7. SEA.verify = SEA.verify || (async (data, pair, cb, opt) => { try {
  8. const json = parse(data)
  9. if(false === pair){ // don't verify!
  10. const raw = (json !== data)?
  11. (json.s && json.m)? parse(json.m) : data
  12. : json;
  13. if(cb){ try{ cb(raw) }catch(e){console.log(e)} }
  14. return raw;
  15. }
  16. opt = opt || {};
  17. // SEA.I // verify is free! Requires no user permission.
  18. if(json === data){ throw "No signature on data." }
  19. const pub = pair.pub || pair
  20. const jwk = S.jwk(pub)
  21. const key = await (shim.ossl || shim.subtle).importKey('jwk', jwk, S.ecdsa.pair, false, ['verify'])
  22. const hash = await sha256hash(json.m)
  23. var buf; var sig; var check; try{
  24. buf = shim.Buffer.from(json.s, opt.encode || 'base64') // NEW DEFAULT!
  25. sig = new Uint8Array(buf)
  26. check = await (shim.ossl || shim.subtle).verify(S.ecdsa.sign, key, sig, new Uint8Array(hash))
  27. if(!check){ throw "Signature did not match." }
  28. }catch(e){
  29. buf = shim.Buffer.from(json.s, 'utf8') // AUTO BACKWARD OLD UTF8 DATA!
  30. sig = new Uint8Array(buf)
  31. check = await (shim.ossl || shim.subtle).verify(S.ecdsa.sign, key, sig, new Uint8Array(hash))
  32. if(!check){ throw "Signature did not match." }
  33. }
  34. const r = check? parse(json.m) : u;
  35. if(cb){ try{ cb(r) }catch(e){console.log(e)} }
  36. return r;
  37. } catch(e) {
  38. console.log(e); // mismatched owner FOR MARTTI
  39. SEA.err = e;
  40. if(SEA.throw){ throw e }
  41. if(cb){ cb() }
  42. return;
  43. }});
  44. module.exports = SEA.verify;