aboutsummaryrefslogtreecommitdiff
path: root/packages/aml-backoffice-ui/src/account.ts
blob: 1c8cd7f53e526eaa32eed3f02bee7c55c30a0961 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
import {
  PaytoUri,
  TalerSignaturePurpose,
  bufferForUint32,
  buildSigPS,
  createEddsaKeyPair,
  decodeCrock,
  decryptWithDerivedKey,
  eddsaGetPublic,
  eddsaSign,
  encodeCrock,
  encryptWithDerivedKey,
  getRandomBytesF,
  stringToBytes,
  stringifyPaytoUri,
} from "@gnu-taler/taler-util";
import { AmlExchangeBackend } from "./types.js";

export interface Account {
  accountId: AccountId;
  signingKey: SigningKey;
}

/**
 * Restore previous session and unlock account with password
 *
 * @param salt string from which crypto params will be derived
 * @param key secured private key
 * @param password password for the private key
 * @returns
 */
export async function unlockAccount(
  account: LockedAccount,
  password: string,
): Promise<Account> {
  const rawKey = decodeCrock(account);
  const rawPassword = stringToBytes(password);

  const signingKey = (await decryptWithDerivedKey(
    rawKey,
    rawPassword,
    password,
  ).catch((e: Error) => {
    throw new UnwrapKeyError(e.message);
  })) as SigningKey;

  const publicKey = eddsaGetPublic(signingKey);

  const accountId = encodeCrock(publicKey) as AccountId;

  return { accountId, signingKey };
}

export function buildQuerySignature(key: SigningKey): string {
  const sigBlob = buildSigPS(
    TalerSignaturePurpose.TALER_SIGNATURE_AML_QUERY,
  ).build();

  return encodeCrock(eddsaSign(sigBlob, key));
}
export function buildDecisionSignature(
  key: SigningKey,
  payto: PaytoUri,
  state: AmlExchangeBackend.AmlState,
): string {
  const sigBlob = buildSigPS(TalerSignaturePurpose.TALER_SIGNATURE_AML_DECISION)
    .put(decodeCrock(stringifyPaytoUri(payto)))
    .put(bufferForUint32(state))
    .build();

  return encodeCrock(eddsaSign(sigBlob, key));
}

declare const opaque_Account: unique symbol;
export type LockedAccount = string & { [opaque_Account]: true };

declare const opaque_AccountId: unique symbol;
export type AccountId = string & { [opaque_AccountId]: true };

declare const opaque_SigningKey: unique symbol;
export type SigningKey = Uint8Array & { [opaque_SigningKey]: true };

/**
 * Create new account (secured private key)
 * secured with the given password
 *
 * @param sessionId
 * @param password
 * @returns
 */
export async function createNewAccount(
  password: string,
): Promise<Account & { safe: LockedAccount }> {
  const { eddsaPriv, eddsaPub } = createEddsaKeyPair();

  const key = stringToBytes(password);

  const protectedPrivKey = await encryptWithDerivedKey(
    getRandomBytesF(24),
    key,
    eddsaPriv,
    password,
  );

  const signingKey = eddsaPriv as SigningKey;
  const accountId = encodeCrock(eddsaPub) as AccountId;
  const safe = encodeCrock(protectedPrivKey) as LockedAccount;

  return { accountId, signingKey, safe };
}

export class UnwrapKeyError extends Error {
  public cause: string;
  constructor(cause: string) {
    super(`Recovering private key failed on: ${cause}`);
    this.cause = cause;
  }
}