-function checkSignature (publicKey: string, data: string, hexSignature: string) {
- const verify = crypto.createVerify(SIGNATURE_ALGORITHM)
-
- let dataString
- if (typeof data === 'string') {
- dataString = data
- } else {
- try {
- dataString = JSON.stringify(data)
- } catch (err) {
- logger.error('Cannot check signature.', { error: err })
- return false
- }
+const bcryptComparePromise = promisify2<any, string, boolean>(compare)
+const bcryptGenSaltPromise = promisify1<number, string>(genSalt)
+const bcryptHashPromise = promisify2<any, string | number, string>(hash)
+
+const httpSignature = require('@peertube/http-signature')
+
+function createPrivateAndPublicKeys () {
+ logger.info('Generating a RSA key...')
+
+ return generateRSAKeyPairPromise(PRIVATE_RSA_KEY_SIZE)
+}
+
+// ---------------------------------------------------------------------------
+// User password checks
+// ---------------------------------------------------------------------------
+
+function comparePassword (plainPassword: string, hashPassword: string) {
+ if (!plainPassword) return Promise.resolve(false)
+
+ return bcryptComparePromise(plainPassword, hashPassword)
+}
+
+async function cryptPassword (password: string) {
+ const salt = await bcryptGenSaltPromise(BCRYPT_SALT_SIZE)
+
+ return bcryptHashPromise(password, salt)
+}
+
+// ---------------------------------------------------------------------------
+// HTTP Signature
+// ---------------------------------------------------------------------------
+
+function isHTTPSignatureDigestValid (rawBody: Buffer, req: Request): boolean {
+ if (req.headers[HTTP_SIGNATURE.HEADER_NAME] && req.headers['digest']) {
+ return buildDigest(rawBody.toString()) === req.headers['digest']