bitcore-lib-zcash/lib/browser/PayPro.js

88 lines
2.4 KiB
JavaScript
Raw Normal View History

2014-07-16 09:03:51 -07:00
"use strict";
var Key = require('./Key');
2014-07-21 13:53:01 -07:00
var KJUR = require('jsrsasign');
2014-07-16 09:03:51 -07:00
var assert = require('assert');
var PayPro = require('../common/PayPro');
2014-07-21 13:52:09 -07:00
var RootCerts = require('../common/RootCerts');
2014-07-16 16:38:00 -07:00
// Documentation:
// http://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.Signature.html#.sign
// http://kjur.github.io/jsrsasign/api/symbols/RSAKey.html
PayPro.prototype.x509Sign = function(key) {
2014-07-16 09:03:51 -07:00
var pki_type = this.get('pki_type');
var pki_data = this.get('pki_data'); // contains one or more x509 certs
pki_data = PayPro.X509Certificates.decode(pki_data);
pki_data = pki_data.certificate;
var type = pki_type.split('+')[1].toUpperCase();
var buf = this.serializeForSig();
2014-07-24 17:40:56 -07:00
var trusted = pki_data.map(function(cert) {
var der = cert.toString('hex');
var pem = KJUR.asn1.ASN1Util.getPEMStringFromHex(der, 'CERTIFICATE');
2014-07-24 17:40:56 -07:00
return RootCerts.getTrusted(pem);
});
2014-07-24 17:40:56 -07:00
// XXX Figure out what to do here
if (!trusted.length) {
// throw new Error('Unstrusted certificate.');
2014-07-24 17:40:56 -07:00
} else {
trusted.forEach(function(name) {
// console.log('Certificate: %s', name);
});
}
2014-07-16 09:03:51 -07:00
var rsa = new KJUR.RSAKey();
rsa.readPrivateKeyFromPEMString(key.toString());
key = rsa;
var jsrsaSig = new KJUR.crypto.Signature({
alg: type + 'withRSA',
prov: 'cryptojs/jsrsa'
});
jsrsaSig.init(key);
jsrsaSig.updateHex(buf.toString('hex'));
2014-07-16 09:03:51 -07:00
var sig = new Buffer(jsrsaSig.sign(), 'hex');
return sig;
2014-07-16 09:03:51 -07:00
};
PayPro.prototype.x509Verify = function(key) {
var sig = this.get('signature');
2014-07-16 09:03:51 -07:00
var pki_type = this.get('pki_type');
var pki_data = this.get('pki_data');
pki_data = PayPro.X509Certificates.decode(pki_data);
pki_data = pki_data.certificate;
var buf = this.serializeForSig();
var type = pki_type.split('+')[1].toUpperCase();
2014-07-16 09:03:51 -07:00
var jsrsaSig = new KJUR.crypto.Signature({
alg: type + 'withRSA',
prov: 'cryptojs/jsrsa'
});
2014-07-24 17:40:56 -07:00
return pki_data.every(function(cert) {
var der = cert.toString('hex');
var pem = KJUR.asn1.ASN1Util.getPEMStringFromHex(der, 'CERTIFICATE');
2014-07-24 17:40:56 -07:00
// XXX Figure out what to do here
var name = RootCerts.getTrusted(pem);
if (!name) {
// throw new Error('Unstrusted certificate.');
2014-07-24 17:40:56 -07:00
} else {
// console.log('Certificate: %s', name);
}
jsrsaSig.initVerifyByCertificatePEM(pem);
jsrsaSig.updateHex(buf.toString('hex'));
2014-07-16 09:03:51 -07:00
return jsrsaSig.verify(sig.toString('hex'));
});
2014-07-16 09:03:51 -07:00
};
module.exports = PayPro;