forked from tangled.org/core
Monorepo for Tangled — https://tangled.org
1package crypto 2 3import ( 4 "bytes" 5 "crypto/sha256" 6 "encoding/base64" 7 "fmt" 8 9 "github.com/hiddeco/sshsig" 10 "golang.org/x/crypto/ssh" 11) 12 13func VerifySignature(pubKey, signature, payload []byte) (error, bool) { 14 pub, _, _, _, err := ssh.ParseAuthorizedKey(pubKey) 15 if err != nil { 16 return fmt.Errorf("failed to parse public key: %w", err), false 17 } 18 19 sig, err := sshsig.Unarmor(signature) 20 if err != nil { 21 return fmt.Errorf("failed to parse signature: %w", err), false 22 } 23 24 buf := bytes.NewBuffer(payload) 25 // we use sha-512 because ed25519 keys require it internally; rsa keys support 26 // multiple algorithms but sha-512 is most secure, and git's ssh signing defaults 27 // to sha-512 for all key types anyway. 28 err = sshsig.Verify(buf, sig, pub, sshsig.HashSHA512, "git") 29 30 return err, err == nil 31} 32 33// SSHFingerprint computes the fingerprint of the supplied ssh pubkey. 34func SSHFingerprint(pubKey string) (string, error) { 35 pk, _, _, _, err := ssh.ParseAuthorizedKey([]byte(pubKey)) 36 if err != nil { 37 return "", err 38 } 39 40 hash := sha256.Sum256(pk.Marshal()) 41 return "SHA256:" + base64.StdEncoding.EncodeToString(hash[:]), nil 42}