diff options
author | Teddy Wing | 2018-11-08 03:06:20 +0100 |
---|---|---|
committer | Teddy Wing | 2018-11-08 03:06:20 +0100 |
commit | 031e8c979c474e7c23c1d111dd07ad2c23f2faaf (patch) | |
tree | 8dfe9200e48a7c17c858caa3a8a2a3bb60e7fc05 | |
parent | 63fe6b3eda3726f95a9375c70d1879f290ba56c9 (diff) | |
download | dome-key-web-031e8c979c474e7c23c1d111dd07ad2c23f2faaf.tar.bz2 |
verify_signature(): Add input signature argument
Hoping this is how to set up the verifier to verify the signature.
-rw-r--r-- | license-generator/paddle/src/lib.rs | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/license-generator/paddle/src/lib.rs b/license-generator/paddle/src/lib.rs index 787f174..5aef6fe 100644 --- a/license-generator/paddle/src/lib.rs +++ b/license-generator/paddle/src/lib.rs @@ -7,11 +7,12 @@ use openssl::sign::Verifier; // https://paddle.com/docs/reference-verifying-webhooks/ -fn verify_signature<'a, I>(pem: &[u8], params: I) -> bool +fn verify_signature<'a, I>(pem: &[u8], signature: &str, params: I) -> bool where I: IntoIterator<Item = (&'a str, &'a str)> { let rsa = Rsa::public_key_from_pem(pem).unwrap(); let pkey = PKey::from_rsa(rsa).unwrap(); - let verifier = Verifier::new(MessageDigest::sha1(), &pkey).unwrap(); + let mut verifier = Verifier::new(MessageDigest::sha1(), &pkey).unwrap(); + verifier.update(signature.as_bytes()).unwrap(); let signature = php_serialize(params); |