object{Object | string | Buffer | KeyObject}dsaEncoding{string}padding{integer}saltLength{integer}
signature{string | Buffer | TypedArray | DataView}signatureEncoding{string} The [encoding][] of thesignaturestring.- Returns: {boolean}
trueorfalsedepending on the validity of the signature for the data and public key.
Verifies the provided data using the given object and signature.
If object is not a [KeyObject][], this function behaves as if
object had been passed to [crypto.createPublicKey()][]. If it is an
object, the following additional properties can be passed:
dsaEncoding{string} For DSA and ECDSA, this option specifies the format of the generated signature. It can be one of the following:'der'(default): DER-encoded ASN.1 signature structure encoding(r, s).'ieee-p1363': Signature formatr || sas proposed in IEEE-P1363.
padding{integer} Optional padding value for RSA, one of the following:crypto.constants.RSA_PKCS1_PADDING(default)crypto.constants.RSA_PKCS1_PSS_PADDING
RSA_PKCS1_PSS_PADDINGwill use MGF1 with the same hash function used to verify the message as specified in section 3.1 of [RFC 4055][], unless an MGF1 hash function has been specified as part of the key in compliance with section 3.3 of [RFC 4055][].saltLength{integer} Salt length for when padding isRSA_PKCS1_PSS_PADDING. The special valuecrypto.constants.RSA_PSS_SALTLEN_DIGESTsets the salt length to the digest size,crypto.constants.RSA_PSS_SALTLEN_AUTO(default) causes it to be determined automatically.
The signature argument is the previously calculated signature for the data, in
the signatureEncoding.
If a signatureEncoding is specified, the signature is expected to be a
string; otherwise signature is expected to be a [Buffer][],
TypedArray, or DataView.
The verify object can not be used again after verify.verify() has been
called. Multiple calls to verify.verify() will result in an error being
thrown.
Because public keys can be derived from private keys, a private key may be passed instead of a public key.
