1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
use cardano_message_signing as ms;
use cardano_multiplatform_lib::address::Address;
use cardano_multiplatform_lib::crypto::Ed25519Signature;
use cardano_multiplatform_lib::crypto::PublicKey;
use cardano_multiplatform_lib::{
address::{BaseAddress, StakeCredential},
error::JsError,
};
use ms::utils::{FromBytes, ToBytes};
use serde::{Deserialize, Serialize};
use std::str;
use wasm_bindgen::prelude::wasm_bindgen;
#[wasm_bindgen]
#[derive(Serialize, Deserialize)]
pub struct DataSignature {
signature: Vec<u8>, key: Vec<u8>, }
#[wasm_bindgen]
impl DataSignature {
pub fn new(cose_signature: &[u8], cose_key: &[u8]) -> Self {
Self {
signature: cose_signature.to_vec(),
key: cose_key.to_vec(),
}
}
pub fn signature(&self) -> Vec<u8> {
self.signature.clone()
}
pub fn key(&self) -> Vec<u8> {
self.key.clone()
}
}
#[wasm_bindgen]
#[derive(Serialize, Deserialize)]
pub struct VerifyResponse {
error: String,
is_valid: bool,
}
#[wasm_bindgen]
impl VerifyResponse {
pub fn new(error: &str, valid: bool) -> Self {
Self {
error: error.to_string(),
is_valid: valid,
}
}
pub fn error(&self) -> String {
self.error.clone()
}
pub fn is_valid(&self) -> bool {
self.is_valid.clone()
}
}
#[wasm_bindgen]
pub fn verify_data_signature(
dt: DataSignature,
expected_message: &str,
expected_address_bech32: &str,
) -> VerifyResponse {
let sign_res = verify_data_signature_cip008(dt, expected_message, expected_address_bech32);
match sign_res {
Ok(val) => VerifyResponse::new("", val),
Err(er) => VerifyResponse::new(
&er.as_string()
.unwrap_or("Failed to verify data signature.".to_string()),
false,
),
}
}
pub fn verify_data_signature_cip008(
dt: DataSignature,
expected_message: &str,
expected_address_bech32: &str,
) -> Result<bool, JsError> {
let cose_sign1 = ms::COSESign1::from_bytes(dt.signature).unwrap();
let payload_to_verify_opt = cose_sign1.payload();
if payload_to_verify_opt.is_none() {
return Ok(false);
}
let payload_to_verify = payload_to_verify_opt.unwrap();
let payload_text = str::from_utf8(&payload_to_verify).unwrap_or_else(|_| "DEFAULT");
if expected_message != payload_text {
return Ok(false);
}
let headers_to_verify = cose_sign1.headers();
let header_addr_val = headers_to_verify
.protected()
.deserialized_headers()
.header(&ms::Label::new_text("address".to_string()))
.unwrap()
.to_bytes();
let cbor_val_address = ms::cbor::CBORValue::from_bytes(header_addr_val)
.unwrap()
.as_bytes()
.unwrap();
let address_res = Address::from_bytes(cbor_val_address);
if address_res.is_err() {
return Err(JsError::from_str("Failed parsing address from header"));
}
let cose_key = ms::COSEKey::from_bytes(dt.key).unwrap();
let pk = PublicKey::from_bytes(
&cose_key
.header(&ms::Label::new_int(&ms::utils::Int::new_negative(
ms::utils::BigNum::from_str("2").unwrap(),
)))
.unwrap()
.as_bytes()
.unwrap(),
)
.unwrap();
let is_address_valid =
verify_signing_address(expected_address_bech32, address_res.unwrap(), &pk);
if is_address_valid.is_err() || !is_address_valid.unwrap() {
return Ok(false);
}
let signed_data = cose_sign1.signed_data(None, None).unwrap().to_bytes();
let sig = Ed25519Signature::from_bytes(cose_sign1.signature()).unwrap();
if pk.verify(&signed_data, &sig) {
Ok(true)
} else {
Ok(false)
}
}
pub fn verify_signing_address(
expected_address_bech32: &str,
coseheader_address: Address,
cose_pubkey: &PublicKey,
) -> Result<bool, JsError> {
let expected_address = Address::from_bech32(expected_address_bech32)?;
if coseheader_address.to_bech32(None)? != expected_address.to_bech32(None)? {
return Ok(false);
}
let base_address = BaseAddress::from_address(&coseheader_address);
if base_address.is_none() {
return Err(JsError::from_str("Signing address is not base address."));
}
let payment_key_hash = cose_pubkey.hash();
let stake_key_hash_opt = base_address.unwrap().stake_cred().to_keyhash();
if stake_key_hash_opt.is_none() {
return Err(JsError::from_str("Address doesn't have stake credential."));
}
let reconstructed_address = BaseAddress::new(
expected_address.network_id()?,
&StakeCredential::from_keyhash(&payment_key_hash),
&StakeCredential::from_keyhash(&stake_key_hash_opt.unwrap()),
);
if expected_address.to_bech32(None)? == reconstructed_address.to_address().to_bech32(None)? {
return Ok(true);
}
return Ok(false);
}
#[derive(Serialize, Deserialize)]
#[wasm_bindgen]
pub struct CustomClaim {
user_id: String,
address: String,
}
#[wasm_bindgen]
impl CustomClaim {
pub fn new(user_id: &str, address: &str) -> Self {
Self {
user_id: user_id.to_string(),
address: address.to_string(),
}
}
pub fn user_id(&self) -> String {
self.user_id.clone()
}
pub fn address(&self) -> String {
self.address.clone()
}
}
#[wasm_bindgen]
pub fn verify_data_signature_new(
dt: DataSignature,
expected_message: &str,
expected_address_bech32: &str,
) -> VerifyResponse {
let sign_res = verify_data_signature_cip30(dt, expected_message, expected_address_bech32);
match sign_res {
Ok(val) => VerifyResponse::new("", val),
Err(er) => VerifyResponse::new(
&er.as_string()
.unwrap_or("Failed to verify data signature.".to_string()),
false,
),
}
}
pub fn verify_data_signature_cip30(
dt: DataSignature,
expected_message: &str,
expected_address_bech32: &str,
) -> Result<bool, JsError> {
let cose_sign1 = ms::COSESign1::from_bytes(dt.signature).unwrap();
let payload_to_verify_opt = cose_sign1.payload();
if payload_to_verify_opt.is_none() {
return Ok(false);
}
let payload_to_verify = payload_to_verify_opt.unwrap();
let payload_text = str::from_utf8(&payload_to_verify).unwrap_or_else(|_| "DEFAULT");
if expected_message != payload_text {
return Ok(false);
}
let cose_key = ms::COSEKey::from_bytes(dt.key).unwrap();
let pk = PublicKey::from_bytes(
&cose_key
.header(&ms::Label::new_int(&ms::utils::Int::new_negative(
ms::utils::BigNum::from_str("2").unwrap(),
)))
.unwrap()
.as_bytes()
.unwrap(),
)
.unwrap();
let is_address_valid =
verify_signing_address_new(expected_address_bech32, &pk);
if is_address_valid.is_err() || !is_address_valid.unwrap() {
return Ok(false);
}
let signed_data = cose_sign1.signed_data(None, None).unwrap().to_bytes();
let sig = Ed25519Signature::from_bytes(cose_sign1.signature()).unwrap();
if pk.verify(&signed_data, &sig) {
Ok(true)
} else {
Ok(false)
}
}
pub fn verify_signing_address_new(
expected_address_bech32: &str,
cose_pubkey: &PublicKey,
) -> Result<bool, JsError> {
let expected_pubkeyhash = Address::from_bech32(expected_address_bech32)?
.staking_cred().expect("Address doesn't have staking credential")
.to_keyhash().expect("We couldn't create keyhash from staking credential")
.to_hex();
let stake_key_hash = cose_pubkey.hash().to_hex();
if expected_pubkeyhash == stake_key_hash {
return Ok(true);
}
return Ok(false);
}