Class: UnionPei::CertUtil
- Inherits:
-
Object
- Object
- UnionPei::CertUtil
- Defined in:
- lib/unionpei/cert_util.rb
Constant Summary collapse
- @@signCerts =
{}
- @@encryptCert =
{}
- @@verifyCerts =
5.0.0验签证书,key是certId
{}
- @@verifyCerts5_1_0 =
5.1.0验签证书,key是base64的证书内容
{}
- @@middleCert =
nil
- @@rootCert =
nil
Class Method Summary collapse
- .getDecryptPriKey(certPath = SDKConfig.instance.signCertPath, certPwd = SDKConfig.instance.signCertPwd) ⇒ Object
- .getEncryptCertId(certPath = SDKConfig.instance.encryptCertPath) ⇒ Object
- .getEncryptKey(certPath = SDKConfig.instance.encryptCertPath) ⇒ Object
- .getSignCertId(certPath = SDKConfig.instance.signCertPath, certPwd = SDKConfig.instance.signCertPwd) ⇒ Object
- .getSignPriKey(certPath = SDKConfig.instance.signCertPath, certPwd = SDKConfig.instance.signCertPwd) ⇒ Object
- .getX509Cert(strCert) ⇒ Object
- .initEncryptCert(certPath = SDKConfig.instance.encryptCertPath) ⇒ Object
- .initMiddleCert ⇒ Object
- .initRootCert ⇒ Object
- .initSignCert(certPath, certPwd) ⇒ Object
- .resetEncryptCertPublicKey ⇒ Object
- .verifyAndGetVerifyKey(certBase64String) ⇒ Object
Class Method Details
.getDecryptPriKey(certPath = SDKConfig.instance.signCertPath, certPwd = SDKConfig.instance.signCertPwd) ⇒ Object
160 161 162 163 |
# File 'lib/unionpei/cert_util.rb', line 160 def self.getDecryptPriKey(certPath = SDKConfig.instance.signCertPath, certPwd = SDKConfig.instance.signCertPwd) CertUtil.initSignCert(certPath, certPwd) unless @@signCerts[certPath] @@signCerts[certPath].key end |
.getEncryptCertId(certPath = SDKConfig.instance.encryptCertPath) ⇒ Object
98 99 100 101 |
# File 'lib/unionpei/cert_util.rb', line 98 def self.getEncryptCertId(certPath = SDKConfig.instance.encryptCertPath) CertUtil.initEncryptCert(certPath) unless @@encryptCert[certPath] @@encryptCert[certPath].certId end |
.getEncryptKey(certPath = SDKConfig.instance.encryptCertPath) ⇒ Object
93 94 95 96 |
# File 'lib/unionpei/cert_util.rb', line 93 def self.getEncryptKey(certPath = SDKConfig.instance.encryptCertPath) CertUtil.initEncryptCert(certPath) unless @@encryptCert[certPath] @@encryptCert[certPath].key end |
.getSignCertId(certPath = SDKConfig.instance.signCertPath, certPwd = SDKConfig.instance.signCertPwd) ⇒ Object
88 89 90 91 |
# File 'lib/unionpei/cert_util.rb', line 88 def self.getSignCertId(certPath = SDKConfig.instance.signCertPath, certPwd = SDKConfig.instance.signCertPwd) CertUtil.initSignCert(certPath, certPwd) unless @@signCerts[certPath] @@signCerts[certPath].certId end |
.getSignPriKey(certPath = SDKConfig.instance.signCertPath, certPwd = SDKConfig.instance.signCertPwd) ⇒ Object
83 84 85 86 |
# File 'lib/unionpei/cert_util.rb', line 83 def self.getSignPriKey(certPath = SDKConfig.instance.signCertPath, certPwd = SDKConfig.instance.signCertPwd) CertUtil.initSignCert(certPath, certPwd) unless @@signCerts[certPath] @@signCerts[certPath].key end |
.getX509Cert(strCert) ⇒ Object
170 171 172 |
# File 'lib/unionpei/cert_util.rb', line 170 def self.getX509Cert(strCert) OpenSSL::X509::Certificate.new(strCert) end |
.initEncryptCert(certPath = SDKConfig.instance.encryptCertPath) ⇒ Object
39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 |
# File 'lib/unionpei/cert_util.rb', line 39 def self.initEncryptCert(certPath = SDKConfig.instance.encryptCertPath) unless certPath LogUtil.info('encryptCertPath is none, exit initEncryptCert') return end LogUtil.info('读取加密证书……') cert = Cert.new file = IO.binread(certPath) x509Cert = OpenSSL::X509::Certificate.new(file) cert.cert = x509Cert cert.certId = x509Cert.serial.to_s cert.key = x509Cert.public_key @@encryptCert[certPath] = cert LogUtil.info("加密证书读取成功,序列号:#{cert.certId}") end |
.initMiddleCert ⇒ Object
69 70 71 72 73 74 75 76 77 78 79 80 81 |
# File 'lib/unionpei/cert_util.rb', line 69 def self.initMiddleCert return if @@middleCert unless SDKConfig.instance.middleCertPath LogUtil.info('middleCertPath is none, exit initMiddleCert') return end LogUtil.info('start initMiddleCert') file = IO.binread(SDKConfig.instance.middleCertPath) x509Cert = OpenSSL::X509::Certificate.new(file) @@middleCert = x509Cert LogUtil.info('initMiddleCert succeed') end |
.initRootCert ⇒ Object
55 56 57 58 59 60 61 62 63 64 65 66 67 |
# File 'lib/unionpei/cert_util.rb', line 55 def self.initRootCert return if @@rootCert unless SDKConfig.instance.rootCertPath LogUtil.info('rootCertPath is none, exit initRootCert') return end LogUtil.info('start initRootCert') file = IO.binread(SDKConfig.instance.rootCertPath) x509Cert = OpenSSL::X509::Certificate.new(file) @@rootCert = x509Cert LogUtil.info('initRootCert succeed') end |
.initSignCert(certPath, certPwd) ⇒ Object
23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 |
# File 'lib/unionpei/cert_util.rb', line 23 def self.initSignCert(certPath, certPwd) if !certPath || !certPwd LogUtil.info('signCertPath or signCertPwd is none, exit initSignCert') return end LogUtil.info('读取签名证书……') cert = Cert.new file = IO.binread(certPath) p12 = OpenSSL::PKCS12.new(file, certPwd) cert.certId = p12.certificate.serial.to_s cert.cert = p12.certificate cert.key = p12.key @@signCerts[certPath] = cert LogUtil.info("签名证书读取成功,序列号:#{cert.certId}") end |
.resetEncryptCertPublicKey ⇒ Object
165 166 167 168 |
# File 'lib/unionpei/cert_util.rb', line 165 def self.resetEncryptCertPublicKey @@encryptCert = {} CertUtil.initEncryptCert end |
.verifyAndGetVerifyKey(certBase64String) ⇒ Object
103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 |
# File 'lib/unionpei/cert_util.rb', line 103 def self.verifyAndGetVerifyKey(certBase64String) return @@verifyCerts5_1_0[certBase64String].key if @@verifyCerts5_1_0[certBase64String] initMiddleCert initRootCert x509Cert = OpenSSL::X509::Certificate.new(certBase64String) cert = Cert.new cert.cert = x509Cert cert.certId = x509Cert.serial.to_s cert.key = x509Cert.public_key store = OpenSSL::X509::Store.new store.purpose = OpenSSL::X509::PURPOSE_ANY store.add_cert(x509Cert) store.add_cert(@@middleCert) store.add_cert(@@rootCert) unless store.verify(x509Cert) LogUtil.error("validate signPubKeyCert by cert chain failed, error=#{store.error}, error string=#{store.error_string}") return nil end sSubject = x509Cert.subject.to_s ss = sSubject.split('@') if ss.length <= 2 LogUtil.error("error sSubject: #{sSubject}") return nil end cn = ss[2] if SDKConfig.instance.ifValidateCNName if UNIONPAY_CNNAME != cn LogUtil.error("cer owner is not CUP:#{cn}") return nil elsif (UNIONPAY_CNNAME != cn) && (cn != '00040000:SIGN') # 测试环境目前是00040000:SIGN LogUtil.error("cer owner is not CUP:#{cn}") return nil end end LogUtil.info("validate signPubKeyCert by cert succeed: #{certBase64String}") @@verifyCerts5_1_0[certBase64String] = cert @@verifyCerts5_1_0[certBase64String].key # 用bc的jar用中级证书验证可以单独验时间,然后再用中级证书验一下,但为了和谐统一,目前改store验证书链验证了。 # if Time.new<x509Cert.not_before or Time.new>x509Cert.not_after # LogUtil..info("verifyPubKeyCert has expired") # return nil # end # if x509Cert.verify(@@middleKey) # return x509Cert.public_key # else # LogUtil.info("validate signPubKeyCert by rootCert failed") # return nil # end end |