forked from martin-key/equihashverify
-
Notifications
You must be signed in to change notification settings - Fork 4
/
equihashverify.cc
67 lines (49 loc) · 1.65 KB
/
equihashverify.cc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
#include <nan.h>
#include <node.h>
#include <node_buffer.h>
#include <v8.h>
#include <stdint.h>
#include "crypto/equihash.h"
#include <vector>
using namespace v8;
int verifyEH(const char *hdr, const std::vector<unsigned char> &soln){
unsigned int n = 144;
unsigned int k = 5;
// Hash state
crypto_generichash_blake2b_state state;
bool btg_salt = true;
EhInitialiseState(n, k, state, btg_salt);
crypto_generichash_blake2b_update(&state, (const unsigned char*)hdr, 140);
bool isValid = Eh144_5.IsValidSolution(state, soln);
return isValid;
}
void Verify(const v8::FunctionCallbackInfo<Value>& args) {
Isolate* isolate = Isolate::GetCurrent();
HandleScope scope(isolate);
if (args.Length() < 2) {
isolate->ThrowException(Exception::TypeError(
String::NewFromUtf8(isolate, "Wrong number of arguments")));
return;
}
Local<Object> header = args[0]->ToObject();
Local<Object> solution = args[1]->ToObject();
if(!node::Buffer::HasInstance(header) || !node::Buffer::HasInstance(solution)) {
isolate->ThrowException(Exception::TypeError(
String::NewFromUtf8(isolate, "Arguments should be buffer objects.")));
return;
}
const char *hdr = node::Buffer::Data(header);
if(node::Buffer::Length(header) != 140) {
//invalid hdr length
args.GetReturnValue().Set(false);
return;
}
const char *soln = node::Buffer::Data(solution);
std::vector<unsigned char> vecSolution(soln, soln + node::Buffer::Length(solution));
bool result = verifyEH(hdr, vecSolution);
args.GetReturnValue().Set(result);
}
void Init(Handle<Object> exports) {
NODE_SET_METHOD(exports, "verify", Verify);
}
NODE_MODULE(equihashverify, Init)