|
|
|
'use strict';
|
|
|
|
|
|
|
|
var Message = Message || require('./Message');
|
|
|
|
|
|
|
|
var RootCerts = require('./common/RootCerts');
|
|
|
|
|
|
|
|
var PayPro = require('./common/PayPro');
|
|
|
|
|
|
|
|
var KJUR = require('jsrsasign');
|
|
|
|
|
|
|
|
var asn1 = require('asn1.js');
|
|
|
|
var rfc3280 = require('asn1.js/rfc/3280');
|
|
|
|
var Certificate = rfc3280.Certificate;
|
|
|
|
|
|
|
|
PayPro.prototype.x509Sign = function(key) {
|
|
|
|
var self = this;
|
|
|
|
var crypto = require('crypto');
|
|
|
|
var pki_type = this.get('pki_type');
|
|
|
|
var pki_data = this.get('pki_data'); // contains one or more x509 certs
|
|
|
|
pki_data = PayPro.X509Certificates.decode(pki_data);
|
|
|
|
pki_data = pki_data.certificate;
|
|
|
|
var details = this.get('serialized_payment_details');
|
|
|
|
var type = pki_type.split('+')[1].toUpperCase();
|
|
|
|
|
|
|
|
var trusted = pki_data.map(function(cert) {
|
|
|
|
var der = cert.toString('hex');
|
|
|
|
var pem = self._DERtoPEM(der, 'CERTIFICATE');
|
|
|
|
return RootCerts.getTrusted(pem);
|
|
|
|
});
|
|
|
|
|
|
|
|
// XXX Figure out what to do here
|
|
|
|
if (!trusted.length) {
|
|
|
|
// throw new Error('Unstrusted certificate.');
|
|
|
|
} else {
|
|
|
|
trusted.forEach(function(name) {
|
|
|
|
// console.log('Certificate: %s', name);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
var signature = crypto.createSign('RSA-' + type);
|
|
|
|
var buf = this.serializeForSig();
|
|
|
|
signature.update(buf);
|
|
|
|
var sig = signature.sign(key);
|
|
|
|
return sig;
|
|
|
|
};
|
|
|
|
|
|
|
|
PayPro.prototype.x509Verify = function() {
|
|
|
|
var self = this;
|
|
|
|
var crypto = require('crypto');
|
|
|
|
var pki_type = this.get('pki_type');
|
|
|
|
var sig = this.get('signature');
|
|
|
|
var pki_data = this.get('pki_data');
|
|
|
|
pki_data = PayPro.X509Certificates.decode(pki_data);
|
|
|
|
pki_data = pki_data.certificate;
|
|
|
|
var details = this.get('serialized_payment_details');
|
|
|
|
var buf = this.serializeForSig();
|
|
|
|
var type = pki_type.split('+')[1].toUpperCase();
|
|
|
|
|
|
|
|
var verifier = crypto.createVerify('RSA-' + type);
|
|
|
|
verifier.update(buf);
|
|
|
|
|
|
|
|
var signedCert = pki_data[0];
|
|
|
|
var der = signedCert.toString('hex');
|
|
|
|
var pem = this._DERtoPEM(der, 'CERTIFICATE');
|
|
|
|
var verified = verifier.verify(pem, sig);
|
|
|
|
|
|
|
|
var chain = pki_data;
|
|
|
|
|
|
|
|
// Verifying the cert chain:
|
|
|
|
// 1. Extract public key from next certificate.
|
|
|
|
// 2. Extract signature from current certificate.
|
|
|
|
// 3. If current cert is not trusted, verify that the current cert is signed
|
|
|
|
// by NEXT by the certificate.
|
|
|
|
// 4. XXX What to do when the certificate is revoked?
|
|
|
|
|
|
|
|
var blen = +type.replace(/[^\d]+/g, '');
|
|
|
|
if (blen === 1) blen = 20;
|
|
|
|
if (blen === 256) blen = 32;
|
|
|
|
|
|
|
|
chain.forEach(function(cert, i) {
|
|
|
|
var der = cert.toString('hex');
|
|
|
|
var pem = self._DERtoPEM(der, 'CERTIFICATE');
|
|
|
|
var name = RootCerts.getTrusted(pem);
|
|
|
|
|
|
|
|
var ncert = chain[i + 1];
|
|
|
|
// The root cert, check if it's trusted:
|
|
|
|
if (!ncert || name) {
|
|
|
|
if (!name) {
|
|
|
|
// console.log('Untrusted certificate.');
|
|
|
|
} else {
|
|
|
|
// console.log('Certificate: %s', name);
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
var nder = ncert.toString('hex');
|
|
|
|
var npem = self._DERtoPEM(nder, 'CERTIFICATE');
|
|
|
|
|
|
|
|
/*
|
|
|
|
https://www.ietf.org/rfc/rfc2459
|
|
|
|
https://en.wikipedia.org/wiki/X509
|
|
|
|
https://github.com/indutny/asn1.js
|
|
|
|
https://github.com/indutny/asn1.js/blob/master/rfc/3280/index.js
|
|
|
|
~/work/node_modules/bitcore/node_modules/asn1.js/rfc/3280/index.js
|
|
|
|
Error: Failed to match tag: "objid" at:
|
|
|
|
["tbsCertificate"]["issuerUniqueID"]["subjectUniqueID"]["extensions"]["extnID"]
|
|
|
|
PR: https://github.com/indutny/asn1.js/pull/22
|
|
|
|
*/
|
|
|
|
|
|
|
|
// Get public key from next certificate.
|
|
|
|
var data = new Buffer(nder, 'hex');
|
|
|
|
var nc = Certificate.decode(data, 'der');
|
|
|
|
var npubKey = nc.tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.data;
|
|
|
|
// Need to convert this to PEM:
|
|
|
|
// Doesn't work because KJUR is terrible:
|
|
|
|
// npubKey = KJUR.KEYUTIL.getPEM(npubKey.toString('hex'));
|
|
|
|
npubKey = self._DERtoPEM(npubKey, 'RSA PUBLIC KEY');
|
|
|
|
|
|
|
|
// Get signature from current certificate.
|
|
|
|
var data = new Buffer(der, 'hex');
|
|
|
|
//var c = Certificate.decode(data, 'der', { partial: true });
|
|
|
|
var c = Certificate.decode(data, 'der');
|
|
|
|
var sig = c.signature.data;
|
|
|
|
|
|
|
|
var verifier = crypto.createVerify('RSA-' + type);
|
|
|
|
|
|
|
|
var t = c.tbsCertificate;
|
|
|
|
|
|
|
|
// Messy work:
|
|
|
|
// Fails on Issuer:
|
|
|
|
/*
|
|
|
|
var cur = Certificate.encode({
|
|
|
|
tbsCertificate: {
|
|
|
|
version: t.version,
|
|
|
|
serialNumber: t.serialNumber,
|
|
|
|
signature: t.signature,
|
|
|
|
// Fails on issuer:
|
|
|
|
//issuer: t.issuer,
|
|
|
|
//issuer: t.issuer.value,
|
|
|
|
//issuer: t.issuer.value.map(function(obj) {
|
|
|
|
// return obj.value;
|
|
|
|
//}),
|
|
|
|
//issuer: t.issuer.type,
|
|
|
|
//issuer: 'rdh',
|
|
|
|
//issuer: rfc3280.Name.decode(t.issuer, 'der'),
|
|
|
|
validity: t.validity,
|
|
|
|
subject: t.subject,
|
|
|
|
subjectPublicKeyInfo: t.subjectPublicKeyInfo,
|
|
|
|
extensions: t.extensions
|
|
|
|
},
|
|
|
|
signatureAlgorithm: '',
|
|
|
|
signature: ''
|
|
|
|
}, 'der');
|
|
|
|
*/
|
|
|
|
|
|
|
|
var cur = Certificate.encode({
|
|
|
|
tbsCertificate: c.tbsCertificate,
|
|
|
|
signatureAlgorithm: '',
|
|
|
|
signature: ''
|
|
|
|
}, 'der');
|
|
|
|
|
|
|
|
// console.log(cur);
|
|
|
|
|
|
|
|
// NOTE: We need to slice off the signatureAlgorithm and signatureValue.
|
|
|
|
// consult the x509 spec:
|
|
|
|
// https://www.ietf.org/rfc/rfc2459
|
|
|
|
verifier.update(new Buffer(der, 'hex'));
|
|
|
|
|
|
|
|
var v = verifier.verify(npubKey, sig);
|
|
|
|
if (!v) {
|
|
|
|
// console.log(i + ' not verified.');
|
|
|
|
verified = false;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
return verified;
|
|
|
|
};
|
|
|
|
|
|
|
|
module.exports = PayPro;
|