82 Commits

Author SHA1 Message Date
nanov
df9c330411 feat: drop moment dependency 2019-11-06 16:52:31 +02:00
nanov
2a17ff6056 chore: write tests for date range 2019-11-06 16:52:20 +02:00
nanov
33ac6ac60f feat: implement date handling and formatting 2019-11-06 16:51:59 +02:00
nanov
e9f7c11bbb v0.1.1 2019-11-05 06:48:24 +02:00
nanov
9aabe933e9 chore: update license 2019-11-05 06:41:31 +02:00
nanov
dc5f52198b v0.1.0 2019-11-05 06:26:02 +02:00
nanov
bb5e551057 chore: cleanup readme 2019-11-05 06:24:39 +02:00
nanov
0a3a4631df update readme 2019-11-05 06:23:45 +02:00
nanov
3ffa323264 chore: commit test keys for tests to pass 2019-11-05 06:22:16 +02:00
nanov
e56dc082d0 chore: add travis config 2019-11-05 06:13:27 +02:00
nanov
0c01420c1e chore: cleanup 2019-11-05 06:09:07 +02:00
nanov
0964992164 chore: drop node-rsa 2019-11-05 06:00:09 +02:00
Dimitar Nanov
5c419630c1 Merge pull request #16 from eCollect/feat/handle-unsual-exponent
Feat: handle unsual exponent migrate to node-forge
2019-11-05 05:58:50 +02:00
Dimitar Nanov
594f2a2623 Merge pull request #15 from eCollect/chore/tests
Add order generation tests and fix linting
2019-11-05 05:55:33 +02:00
nanov
fa557f5e9b feat: tests 2019-11-05 05:54:32 +02:00
nanov
cf16abc843 chire: jsdoc 2019-11-05 05:54:16 +02:00
nanov
c60fed4d58 chore: lint 2019-11-05 05:54:09 +02:00
nanov
9aa2ab7380 chore: lint 2019-11-05 05:53:20 +02:00
nanov
fe2ad67139 chore: update linter 2019-11-05 05:49:07 +02:00
Vladislav Hristov
104ec67f8c chore: add ; at the end of Key.js 2019-11-01 16:52:36 +02:00
Vladislav Hristov
e8a80932e1 fit: key size is now calculated instead of hardcoded 2019-11-01 16:50:39 +02:00
Vladislav Hristov
ce6cd02e58 fit: BankLetter.js get key size 2019-11-01 16:28:04 +02:00
Vladislav Hristov
836ec0ebf3 fit(tests): use new Key in keys test 2019-11-01 13:49:59 +02:00
Vladislav Hristov
59a281c895 feat: use new Key in Keys manager 2019-11-01 13:49:33 +02:00
Vladislav Hristov
61ada747f3 clean: remove modulus and exponent property from bankKeys() 2019-11-01 13:48:51 +02:00
Vladislav Hristov
f15e09840a add: add Key class to manage a single key 2019-11-01 13:44:29 +02:00
nanov
422821fbbd feat: test all H004 orders 2019-11-01 11:27:36 +02:00
nanov
e40f79cee6 feat: prepare order generation tests 2019-11-01 08:13:53 +02:00
Dimitar Nanov
837fdaa08c Merge pull request #14 from yagop/test/mocha-script
test script run mocha
2019-11-01 05:59:38 +02:00
Yago Perez
361acf89d0 test script run mocha 2019-10-31 21:40:07 +01:00
Vladislav Hristov
4149c01695 wip: migrate to node-forge 2019-10-31 18:57:42 +02:00
Vladislav Hristov
1c1f112ff5 fix: modulus zero byte handling 2019-10-30 10:53:03 +02:00
nanov
1320f6f21d chore: update deps 2019-10-14 14:19:11 +03:00
Vladislav Hristov
0049fffc00 up the version to 0.0.8 2019-10-08 16:10:08 +03:00
Vladislav Hristov
2c9040904a chore: remove console.log statements 2019-10-08 16:09:08 +03:00
Dimitar Nanov
0f6dcf9eb2 Merge pull request #11 from yagop/fix-version
chore: readme maintenance
2019-10-03 09:32:17 +03:00
nanov
ca31edf245 chore: add yagop to contributors 2019-10-03 09:30:49 +03:00
nanov
4464349d0f chore: remove version from readme 2019-10-03 09:29:35 +03:00
Dimitar Nanov
15546df9ea Merge pull request #10 from yagop/examples
Provide examples
2019-10-03 09:20:29 +03:00
Yago Perez
40467a2c5e v0.0.35 -> v0.0.7 2019-10-03 00:20:36 +02:00
Yago Perez
eb9fbf5834 Change HBT order text 2019-10-03 00:10:52 +02:00
Yago Perez
166c61aec4 examples/send-hbt-order.js 2019-10-02 23:58:37 +02:00
Yago Perez
5a63e19aab examples/save-bank-kesy.js 2019-10-02 23:58:35 +02:00
Yago Perez
9e6c318372 keys -> passphrase 2019-10-02 23:58:33 +02:00
Yago Perez
ce6e58b3f3 examples/bankLetter.js 2019-10-02 23:58:29 +02:00
Yago Perez
7dad7c8787 initialize.js 2019-10-02 23:56:51 +02:00
Dimitar Nanov
79f17e1404 bump version 2019-08-02 10:52:48 +03:00
Dimitar Nanov
3ef32c8ce5 Merge pull request #7 from anandsahil/addCAMT53OrderType
* Add Z53 order type
* Create utils container and move dateRange functionality to there
2019-08-01 16:59:25 +03:00
anandsahil
aa761cf7ad move dateRange from constants to utils 2019-08-01 14:14:30 +02:00
anandsahil
5ff3147124 add new order type XZ53 and removed repeated dateRange to consts 2019-08-01 14:00:07 +02:00
anandsahil
01d4634d86 Merge remote-tracking branch 'src/master' 2019-08-01 13:52:51 +02:00
sahil anand
89904afa63 Merge pull request #2 from anandsahil/minorChanges
remove eCollect from constant and minor verbose error handeling
2019-07-25 17:40:29 +02:00
sahil anand
4907524259 Merge pull request #1 from anandsahil/and-XCT-order-type
add iso pain format XCT order type
2019-07-25 17:40:04 +02:00
Dimitar Nanov
c9f52d3bd9 bump 2019-07-24 09:12:06 +03:00
Dimitar Nanov
f5b05ae491 Merge pull request #4 from anandsahil/minorChanges
remove eCollect from constant and minor verbose error handaling
2019-07-24 09:05:14 +03:00
Dimitar Nanov
9f88b048d7 Merge pull request #5 from anandsahil/and-XCT-order-type
add iso pain format XCT order type
2019-07-24 09:04:22 +03:00
anandsahil
d06e92c51c add iso pain format XCT order type 2019-07-22 17:36:38 +02:00
anandsahil
cb2062ae2f remove eCollect from constant and minor verbose error handeling 2019-07-22 17:31:24 +02:00
Dimitar Nanov
07a48e9cc5 0.0.5 2019-06-28 17:12:49 +03:00
Dimitar Nanov
800002701d Merge pull request #3 from vasyas/master
Fix parsing of the bank keys in the HPB response
2019-06-28 17:09:49 +03:00
vasyas
5f0b6cd374 #2 corrected bank keys parsing 2019-06-27 00:13:44 +03:00
vasyas
c571ef181b tc for bank keys parsing error 2019-06-27 00:10:53 +03:00
Dimitar Nanov
7b0015b2b3 0.0.4 2018-09-03 09:35:57 +03:00
Vladislav Hristov
968b582493 Fix BankLetter constructor 2018-08-31 10:24:34 +03:00
Vladislav Hristov
1f857a7f85 Fix serialize method 2018-08-31 10:23:41 +03:00
Vladislav Hristov
e2af5c6ea8 Add traces storage 2018-08-31 08:50:18 +03:00
Vladislav Hristov
548c17a868 Add serialize function to BankLetter class 2018-08-30 13:53:24 +03:00
Vladislav Hristov
5d4e9f8309 Fix orderData method 2018-07-04 16:30:16 +03:00
Vladislav Hristov
044bbba9e3 Add returned codes errors and messages 2018-07-03 12:48:00 +03:00
Vladislav Hristov
ab2853956c Return body error code 2018-07-03 12:03:37 +03:00
Vladislav Hristov
b259ac76d6 Code optimization 2018-06-28 11:34:14 +03:00
Vladislav Hristov
9660242234 Async read and write keys 2018-06-27 17:59:35 +03:00
Vladislav Hristov
9cfed8ec81 Add keys generation and code optimization 2018-06-27 14:21:49 +03:00
Vladislav Hristov
c0ec4b8fb7 add predefined orders 2018-06-20 14:08:31 +03:00
Vladislav Hristov
8e9e0df276 code cleaning 2018-06-20 12:22:16 +03:00
Vladislav Hristov
945499290a client and order optimization 2018-06-20 12:20:03 +03:00
Vladislav Hristov
187636019c code optimization 2018-06-15 09:33:41 +03:00
Vladislav Hristov
d5d80ee1b8 clean up the code 2018-06-12 11:27:56 +03:00
Vladislav Hristov
10111878fa reorder file structure 2018-06-11 15:25:07 +03:00
Vladislav Hristov
ff9a3a16b4 Major changes. Separating responsibilities. Orders builder, serializer. 2018-06-11 11:38:32 +03:00
Vladislav Hristov
90f51544b7 update dependencies 2018-06-04 15:30:33 +03:00
AngelPashov
8492d94054 various modular fixes 2018-06-01 16:16:43 +03:00
90 changed files with 8809 additions and 1344 deletions

View File

@@ -1,4 +1,5 @@
node_modules/
examples/
build/
static/
config/

View File

@@ -1,34 +1,4 @@
{
"extends": "airbnb",
"env": {
"node": true
},
"parserOptions": {
"ecmaVersion": 8,
"sourceType": "script",
"ecmaFeatures": {
"modules": false
}
},
"rules": {
"max-len": 0,
"linebreak-style": 0,
"no-plusplus": [
2,
{
"allowForLoopAfterthoughts": true
}
],
"no-continue": 0,
"indent": [2, "tab"],
"no-tabs": 0,
"strict": [2, "safe"],
"curly": [2, "multi", "consistent"],
"import/no-extraneous-dependencies": 0,
"import/no-unresolved": 0,
"no-underscore-dangle": 0,
"no-param-reassign": 0,
"generator-star-spacing": 0,
"jsx-a11y/href-no-hash": "off"
}
"extends": "ecollect-base",
"root": true
}

1
.gitignore vendored
View File

@@ -10,5 +10,4 @@ yarn.lock
*.pid
/coverage
package-lock.json
*.key
*.html

7
.travis.yml Normal file
View File

@@ -0,0 +1,7 @@
language: node_js
node_js:
- "8"
- "9"
- "10"
- "11"
- "12"

View File

@@ -1,5 +1,14 @@
# node-ebics-client v0.0.35
---
# node-ebics-client
<p align="center">
<a href="https://travis-ci.org/eCollect/node-ebics-client" title="Build Status"><img src="https://travis-ci.org/eCollect/node-ebics-client.svg?branch=master" alt="Build Status" /></a>
<a href="https://www.npmjs.com/package/ebics-client" title="Build Status">
<img alt="ebics-client" src="https://img.shields.io/npm/v/ebics-client">
</a>
<a href="https://snyk.io/test/github/ecollect/node-ebics-client" title="Known Vulnerabilities">
<img src="https://snyk.io/test/github/ecollect/node-ebics-client/badge.svg" alt="Known Vulnerabilities">
</a>
<a href="/eCollect/node-ebics-client/blob/master/LICENSE" title="GPL-3.0"><img alt="GPL-3.0" src="https://img.shields.io/github/license/eCollect/node-ebics-client"></a>
</p>
Pure node.js ( >=8 ) implementation of [EBICS](https://en.wikipedia.org/wiki/Electronic_Banking_Internet_Communication_Standard) ( Electronic Banking Internet Communication ).
@@ -12,6 +21,7 @@ The client is currently tested and verified to work with the following banks:
* [Credit Suisse (Schweiz) AG](https://www.credit-suisse.com/ch/en.html)
* [Zürcher Kantonalbank](https://www.zkb.ch/en/lg/ew.html)
* [Raiffeisen Schweiz](https://www.raiffeisen.ch/rch/de.html)
* [BW Bank](https://www.bw-bank.de/de/home.html)
## Inspiration
@@ -21,4 +31,6 @@ The basic concept of this library was inspired by the [EPICS](https://github.com
## Copyright
Copyright: eCollect AG, 2018.
Copyright: eCollect AG, 2018-9.
Licensed under the [GPLv3](LICENSE) license.

31
examples/bankLetter.js Executable file
View File

@@ -0,0 +1,31 @@
#! /usr/bin/env node
'use strict';
const ebics = require('../index');
const path = require('path');
const fs = require('fs');
const os = require('os');
const client = new ebics.Client({
url: 'https://ebics.server',
partnerId: '',
userId: '',
hostId: '',
passphrase: 'test', // keys-test will be decrypted with this passphrase
keyStorage: ebics.fsKeysStorage('./keys-test'),
});
const bankName = 'Bank name';
const template = fs.readFileSync('./templates/ini.hbs').toString();
const letter = new ebics.BankLetter({ client, bankName, template });
const bankLetterFile = path.join(os.homedir(), 'bankLetter.html');
letter.serialize(bankLetterFile)
.then(() => {
console.log('Send your bank the letter (%s)', bankLetterFile);
})
.catch((err) => {
console.error(err);
process.exit(1);
});

32
examples/initialize.js Executable file
View File

@@ -0,0 +1,32 @@
#! /usr/bin/env node
'use strict';
const ebics = require('../index');
const client = new ebics.Client({
url: 'https://ebics.server',
partnerId: 'PARTNER',
userId: 'USER',
hostId: 'HOST',
passphrase: 'test', // keys-test will be encrypted with this passphrase
keyStorage: ebics.fsKeysStorage('./keys-test'),
});
// New keys will be generated and saved in ./keys-test
client.send(ebics.Orders.INI)
.then((resp) => {
console.log('Respose for INI order %j', resp);
return client.send(ebics.Orders.HIA);
})
.then((resp) => {
console.log('Reponse for HIA order %j', resp);
if (resp.technicalCode !== '000000')
throw new Error('Something might went wrong');
console.log('Public keys should be sent to bank now. See examples/bankLetter.js');
})
.catch((err) => {
console.error(err);
process.exit(1);
});

30
examples/save-bank-kesy.js Executable file
View File

@@ -0,0 +1,30 @@
#! /usr/bin/env node
'use strict';
const ebics = require('../index');
const client = new ebics.Client({
url: 'https://ebics.server',
partnerId: '',
userId: '',
hostId: '',
passphrase: 'test', // keys-test will be decrypted with this passphrase
keyStorage: ebics.fsKeysStorage('./keys-test'),
});
// Client keys must be already generated and send by letter.
// The bank should have enabled the user
client.send(ebics.Orders.HPB)
.then((resp) => {
console.log('Respose for HPB order %j', resp);
if (resp.technicalCode !== '000000')
throw new Error('Something went wrong');
console.log('Received bank keys: %j', resp.bankKeys);
return client.setBankKeys(resp.bankKeys);
})
.catch((err) => {
console.error(err);
process.exit(1);
});

29
examples/send-hbt-order.js Executable file
View File

@@ -0,0 +1,29 @@
#! /usr/bin/env node
'use strict';
const ebics = require('../index');
const client = new ebics.Client({
url: 'https://ebics.server',
partnerId: '',
userId: '',
hostId: '',
passphrase: 'test', // keys-test will be decrypted with this passphrase
keyStorage: ebics.fsKeysStorage('./keys-test'),
});
// The bank keys must have been already saved
client.send(ebics.Orders.HTD)
.then((resp) => {
console.log('Respose for HTD order %j', resp);
if (resp.technicalCode !== '000000')
throw new Error('Something went wrong');
const data = Buffer.from(resp.orderData);
console.log(data.toString('utf8'));
})
.catch((err) => {
console.error(err);
process.exit(1);
});

View File

@@ -1,4 +1,15 @@
'use strict';
const Client = require('./lib/Client');
module.exports = Client;
const Orders = require('./lib/predefinedOrders');
const fsKeysStorage = require('./lib/storages/fsKeysStorage');
const tracesStorage = require('./lib/storages/tracesStorage');
const BankLetter = require('./lib/BankLetter');
module.exports = {
Client,
Orders,
BankLetter,
fsKeysStorage,
tracesStorage,
};

View File

@@ -2,65 +2,67 @@
const fs = require('fs');
const moment = require('moment');
const handlebars = require('handlebars');
const BN = require("bn.js");
const Crypto = require('./crypto/Crypto');
const { date } = require('./utils.js');
// const BN = require('bn.js');
const registerHelpers = () => {
handlebars.registerHelper('today', () => date.toISODate(Date.now(), false));
handlebars.registerHelper('now', () => date.toISOTime(Date.now(), false));
handlebars.registerHelper('keyExponentBits', k => Buffer.byteLength(k.e()) * 8);
handlebars.registerHelper('keyModulusBits', k => k.size());
handlebars.registerHelper('keyExponent', k => k.e('hex'));
handlebars.registerHelper('keyModulus', k => k.n('hex').toUpperCase().match(/.{1,2}/g).join(' '));
handlebars.registerHelper('sha256', (k) => {
const digest = Buffer.from(Crypto.digestPublicKey(k), 'base64').toString('HEX');
return digest.toUpperCase().match(/.{1,2}/g).join(' ');
});
};
module.exports = class BankLetter {
constructor(client, bankName) {
this.client = client;
this.bankName = bankName;
this.pathToTemplate = './app/ebics/ini.hbs';
};
constructor({
client,
bankName,
template,
}) {
this.client = client;
this.bankName = bankName;
this.template = template;
}
_registerHelpers() {
handlebars.registerHelper("today", () => {
return moment().format('DD.MM.YYYY');
});
async generate() {
registerHelpers();
handlebars.registerHelper("now", () => {
return moment().format('HH:mm:ss');
});
handlebars.registerHelper("keyExponentBits", (k) => {
return Buffer.byteLength(new BN(k.key.keyPair.e).toBuffer()) * 8;
});
handlebars.registerHelper("keyModulusBits", (k) => {
return k.key.getKeySize();
// return Buffer.byteLength(new BN(k.key.keyPair.e).toBuffer()) * 8;
});
handlebars.registerHelper("keyExponent", (k) => {
return k.e();
});
handlebars.registerHelper("keyModulus", (k) => {
return k.n().toUpperCase().match(/.{1,2}/g).join(' ');
});
handlebars.registerHelper("sha256", (k) => {
const digest = Buffer.from(k.publicDigest(), 'base64').toString('HEX');
return digest.toUpperCase().match(/.{1,2}/g).join(' ');
});
};
generate() {
this._registerHelpers();
const str = fs.readFileSync(this.pathToTemplate).toString();
const templ = handlebars.compile(str);
const templ = handlebars.compile(this.template);
const keys = await this.client.keys();
const data = {
bankName : this.bankName,
userId : this.client.userId,
bankName: this.bankName,
userId: this.client.userId,
partnerId: this.client.partnerId,
A006 : this.client.a(),
X002 : this.client.x(),
E002 : this.client.e(),
A006: keys.a(),
X002: keys.x(),
E002: keys.e(),
};
return templ(data);
}
}
async serialize(path) {
const letter = await this.generate();
try {
fs.writeFileSync(path, letter);
} catch (error) {
throw error;
}
return new Promise(resolve => resolve(true));
}
};

View File

@@ -1,234 +1,246 @@
'use strict';
const fs = require("fs");
const crypto = require("crypto");
const $request = require("request");
const $request = require('request');
const BN = require('bn.js');
const xpath = require("xpath");
const NodeRSA = require("node-rsa");
const DOMParser = require("xmldom").DOMParser;
const constants = require('./consts');
const Keys = require('./keymanagers/Keys');
const defaultKeyEncryptor = require('./keymanagers/defaultKeyEncryptor');
const signer = require('./middleware/signer');
const serializer = require('./middleware/serializer');
const response = require('./middleware/response');
const stringifyKeys = (keys) => {
Object.keys(keys).map((key) => {
keys[key] = keys[key] === null ? null : keys[key].toPem();
return key;
});
return JSON.stringify(keys);
};
/**
* Keys persistent object
* @typedef {Object} KeysObject
* @property {string} A006 - PEM representation of the A006 private key
* @property {string} E002 - PEM representation of the E002 private key
* @property {string} X002 - PEM representation of the X002 private key
* @property {string} bankX002 - PEM representation of the bankX002 public key
* @property {string} bankE002 - PEM representation of the bankE002 public key
*/
/**
* Key storage implementation
* @typedef {Object} KeyStorage
* @property {(data: KeysObject):Promise<void>} write - writes the keys to storage
* @property {():Promise<KeysObject>} read - reads the keys from storage
*/
/**
* Client initilization options
* @typedef {Object} EbicClientOptions
* @property {string} url - EBICS URL provided by the bank
* @property {string} partnerId - PARTNERID provided by the bank
* @property {string} hostId - HOSTID provided by the bank
* @property {string} userId - USERID provided by the bank
* @property {string} passphrase - passphrase for keys encyprion
* @property {KeyStorage} keyStorage - keyStorage implementation
* @property {object} [tracesStorage] - traces (logs) storage implementation
*/
const Key = require('./Key');
const XMLSign = require('./middleware/XMLSign');
const ParseResponse = require('./middleware/ParseResponse');
const BankLetter = require('./BankLetter');
const EBICSINI = require('./orders/INI');
const EBICSHIA = require('./orders/HIA');
const EBICSHPB = require('./orders/HPB');
const EBICSHKD = require('./orders/HKD');
const EBICSHAA = require('./orders/HAA');
const EBICSHAC = require('./orders/HAC');
const EBICSHTD = require('./orders/HTD');
const EBICSC52 = require('./orders/C52');
const utils = {
exponent: {
// str = 65537 => AQAB
toBase64(str) {
return new BN(str).toBuffer().toString('base64');
},
// str = AQAB => 65537
fromBase64(str) {
return new BN(Buffer.from(str, 'base64'), 2).toNumber();
}
}
}
module.exports = class Client {
constructor(keysContent, passphrase, url, hostId, userId, partnerId) {
this.keysContent = keysContent;
this.passphrase = passphrase;
this.url = url;
this.hostId = hostId;
this.userId = userId;
this.partnerId = partnerId;
this.encryptAlgorithm = 'aes-256-cbc';
this.keys = keysContent ? this.extractKeys() : {};
};
/**
*Creates an instance of Client.
* @param {EbicClientOptions} clientOptions
*/
constructor({
url,
partnerId,
userId,
hostId,
passphrase,
keyStorage,
tracesStorage,
}) {
if (!url)
throw new Error('EBICS URL is requierd');
if (!partnerId)
throw new Error('partnerId is requierd');
if (!userId)
throw new Error('userId is requierd');
if (!hostId)
throw new Error('hostId is requierd');
if (!passphrase)
throw new Error('passphrase is requierd');
a() {
return this.keys["A006"];
};
if (!keyStorage || typeof keyStorage.read !== 'function' || typeof keyStorage.write !== 'function')
throw new Error('keyStorage implementation missing or wrong');
e() {
return this.keys["E002"];
};
x() {
return this.keys["X002"];
this.url = url;
this.partnerId = partnerId;
this.userId = userId;
this.hostId = hostId;
this.keyStorage = keyStorage;
this.keyEncryptor = defaultKeyEncryptor({ passphrase });
this.tracesStorage = tracesStorage || null;
}
bankX() {
return this.keys[`${this.hostId}.X002`];
async send(order) {
const isInObject = ('operation' in order);
if (!isInObject) throw new Error('Operation for the order needed');
if (order.operation.toUpperCase() === constants.orderOperations.ini) return this.initialization(order);
const keys = await this.keys();
if (keys === null) throw new Error('No keys provided. Can not send the order or any other order for that matter.');
if (order.operation.toUpperCase() === constants.orderOperations.upload) return this.upload(order);
if (order.operation.toUpperCase() === constants.orderOperations.download) return this.download(order);
throw new Error('Wrong order operation provided');
}
bankE() {
return this.keys[`${this.hostId}.E002`];
}
async initialization(order) {
const keys = await this.keys();
if (keys === null) this._generateKeys();
encrypt(data) {
const cipher = crypto.createCipher(this.encryptAlgorithm, this.passphrase);
const encrypted = cipher.update(data, 'utf8', 'hex') + cipher.final('hex');
if (this.tracesStorage)
this.tracesStorage.new().ofType('ORDER.INI');
const res = await this.ebicsRequest(order);
const xml = res.orderData();
return Buffer.from(encrypted).toString('base64');
};
const returnedTechnicalCode = res.technicalCode();
const returnedBusinessCode = res.businessCode();
decrypt(data) {
data = (new Buffer(data, 'base64')).toString();
return {
orderData: xml.length ? xml.toString() : xml,
orderId: res.orderId(),
const decipher = crypto.createDecipher(this.encryptAlgorithm, this.passphrase);
const decrypted = decipher.update(data, 'hex', 'utf8') + decipher.final('utf8');
technicalCode: returnedTechnicalCode,
technicalCodeSymbol: res.technicalSymbol(),
technicalCodeShortText: res.technicalShortText(returnedTechnicalCode),
technicalCodeMeaning: res.technicalMeaning(returnedTechnicalCode),
return decrypted;
};
businessCode: returnedBusinessCode,
businessCodeSymbol: res.businessSymbol(returnedBusinessCode),
businessCodeShortText: res.businessShortText(returnedBusinessCode),
businessCodeMeaning: res.businessMeaning(returnedBusinessCode),
static setup(passphrase, url, hostId, userId, partnerId, keysize = 2048) {
const client = new Client(null, passphrase, url, hostId, userId, partnerId);
for (let key in {A006: '', X002: '', E002: ''}) {
client.keys[key] = new Key(new NodeRSA({ b: keysize }));
}
return client;
};
saveIniLetter(bankName, path) {
const letter = new BankLetter(this, bankName);
try {
fs.writeFileSync(path, letter.generate());
} catch (error) {
throw error;
}
};
saveKeys(path) {
const data = {};
for (let key in this.keys) {
data[key] = this.encrypt(this.keys[key].toPem());
bankKeys: res.bankKeys(),
};
try {
fs.writeFileSync(path, JSON.stringify(data));
} catch(error) {
throw error;
}
};
extractKeys() {
const keys = {};
const jsonData = JSON.parse(this.keysContent);
for (let key in jsonData) {
keys[key] = new Key(this.decrypt(jsonData[key]));
}
return keys;
}
async download(order) {
const res = await this.ebicsRequest(order.toXML());
const ttt = res.toXML(); // keep this for debugging purposes
if (this.tracesStorage)
this.tracesStorage.new().ofType('ORDER.DOWNLOAD');
const res = await this.ebicsRequest(order);
order.transactionId = res.transactionId();
if (res.isSegmented() && res.isLastSegment()) {
const receipt = await this.ebicsRequest(order.toReceiptXML());
if (this.tracesStorage)
this.tracesStorage.connect().ofType('RECEIPT.ORDER.DOWNLOAD');
const receiptXML = order.toReceiptXML(); // keep this for debugging purposes
const rX = receipt.toXML(); // keep this for debugging purposes
await this.ebicsRequest(order);
}
return res.orderData();
};
const returnedTechnicalCode = res.technicalCode();
const returnedBusinessCode = res.businessCode();
async upload(order) {
let res = await this.ebicsRequest(order.toXML());
order.transactionId = res.transactionId();
const orderId = res.orderId();
return {
orderData: res.orderData(),
orderId: res.orderId(),
res = await this.ebicsRequest(order.toTransferXML());
technicalCode: returnedTechnicalCode,
technicalCodeSymbol: res.technicalSymbol(),
technicalCodeShortText: res.technicalShortText(returnedTechnicalCode),
technicalCodeMeaning: res.technicalMeaning(returnedTechnicalCode),
return res.transactionId();
businessCode: returnedBusinessCode,
businessCodeSymbol: res.businessSymbol(returnedBusinessCode),
businessCodeShortText: res.businessShortText(returnedBusinessCode),
businessCodeMeaning: res.businessMeaning(returnedBusinessCode),
};
}
async downloadAndUnzip(order) {
async upload(order) {
if (this.tracesStorage)
this.tracesStorage.new().ofType('ORDER.UPLOAD');
let res = await this.ebicsRequest(order);
const transactionId = res.transactionId();
const orderId = res.orderId();
order.transactionId = transactionId;
if (this.tracesStorage)
this.tracesStorage.connect().ofType('TRANSFER.ORDER.UPLOAD');
res = await this.ebicsRequest(order);
return [transactionId, orderId];
}
ebicsRequest(order) {
return new Promise((resolve, reject) => {
return new Promise(async (resolve, reject) => {
const { version } = order;
const keys = await this.keys();
const r = signer.version(version).sign((await serializer.use(order, this)).toXML(), keys.x());
if (this.tracesStorage)
this.tracesStorage.label(`REQUEST.${order.orderDetails.OrderType}`).data(r).persist();
$request.post({
url : this.url,
body : XMLSign.go(this, order),
headers: { 'content-type': 'text/xml;charset=UTF-8' }
url: this.url,
body: r,
headers: { 'content-type': 'text/xml;charset=UTF-8' },
}, (err, res, data) => {
return err ? reject(err): resolve(ParseResponse.go(this, data));
if (err) reject(err);
const ebicsResponse = response.version(version)(data, keys);
if (this.tracesStorage)
this.tracesStorage.label(`RESPONSE.${order.orderDetails.OrderType}`).connect().data(ebicsResponse.toXML()).persist();
resolve(ebicsResponse);
});
});
};
}
async INI() {
return this.ebicsRequest((new EBICSINI(this)).toXML());
};
async signOrder(order) {
const { version } = order;
const keys = await this.keys();
return signer.version(version).sign((await serializer.use(order, this)).toXML(), keys.x());
}
async HIA() {
return this.ebicsRequest((new EBICSHIA(this)).toXML());
};
async keys() {
try {
const keysString = await this._readKeys();
async HPB() {
const data = await this.download(new EBICSHPB(this));
const doc = new DOMParser().parseFromString(data, 'text/xml');
const sel = xpath.useNamespaces({'xmlns': "urn:org:ebics:H004"});
const keyNodes = sel("//xmlns:PubKeyValue", doc);
// console.log(keyNodes);
function xmlLastChild (node) {
let y = node.lastChild;
while (y.nodeType != 1) y = y.previousSibling;
return y;
};
for (let i = 0; i < keyNodes.length; i++) {
const type = xmlLastChild(keyNodes[i].parentNode).textContent;
const modulus = xpath.select("//*[local-name(.)='Modulus']", keyNodes[i])[0].textContent;
const exponent = xpath.select("//*[local-name(.)='Exponent']", keyNodes[i])[0].textContent;
const mod = new BN(Buffer.from(modulus, 'base64'), 2).toBuffer();
const exp = utils.exponent.fromBase64(exponent);
const bank = new NodeRSA();
bank.importKey({ n: mod, e: exp }, 'components-public');
this.keys[`${this.hostId}.${type}`] = new Key(bank);
return new Keys(JSON.parse(this.keyEncryptor.decrypt(keysString)));
} catch (err) {
return null;
}
}
return [this.bankX(), this.bankE()];
};
_generateKeys() {
const keysObject = Keys.generate();
HKD() {
return this.download(new EBICSHKD(this));
};
this._writeKeys(keysObject);
}
HAA() {
return this.download(new EBICSHAA(this));
};
async setBankKeys(bankKeys) {
const keysObject = await this.keys();
HTD() {
return this.download(new EBICSHTD(this));
};
keysObject.setBankKeys(bankKeys);
await this._writeKeys(keysObject);
}
HAC(from = null, to = null) {
return this.download(new EBICSHAC(this, from, to));
};
_readKeys() {
return this.keyStorage.read();
}
C52(from, to) {
return this.downloadAndUnzip(new EBICSC52(this, from, to));
_writeKeys(keysObject) {
return this.keyStorage.write(this.keyEncryptor.encrypt(stringifyKeys(keysObject.keys)));
}
};

View File

@@ -1,79 +0,0 @@
'use strict';
const crypto = require('crypto');
const BN = require('bn.js');
const NodeRSA = require("node-rsa");
const MGF1 = require('./MGF1');
module.exports = class Key {
constructor(encodedKey, passphrase = null) {
if (encodedKey instanceof NodeRSA) {
this.key = encodedKey
} else {
this.key = new NodeRSA(encodedKey);
}
};
publicDigest() {
const str = [this.e().replace(/^(0+)/g, ''), this.n().replace(/^(0+)/g, '')].map((x) => x.toLowerCase()).join(' ');
return crypto.createHash('sha256').update(str).digest('base64').trim();
};
publicEncrypt(buf) {
return crypto.publicEncrypt({ 'key': this.toPem(), padding: crypto.constants.RSA_PKCS1_PADDING }, buf);
}
n() {
return this.key.exportKey("components-public").n.toString("hex", 1);
};
e() {
return new BN(this.key.exportKey("components-public").e).toBuffer().toString('hex');
};
toPem() {
return this.key.isPrivate() ? this.key.exportKey("pkcs1-private-pem") : this.key.exportKey("pkcs8-public-pem");
}
sign(msg, salt = crypto.randomBytes(32)) {
const base = new BN(this._emsaPSS(msg, salt));
const power = new BN(this.key.keyPair.d.toBuffer());
const mod = new BN(this.key.keyPair.n.toBuffer());
return (this._modPow(base, power, mod)).toBuffer().toString('base64');
}
_emsaPSS(msg, salt) {
const eightNullBytes = Buffer.from("\x00".repeat(8));
const digestedMsg = crypto.createHash('sha256').update(msg).digest();
const mTickHash = crypto.createHash('sha256').update(Buffer.concat([eightNullBytes, digestedMsg, salt]), 'binary').digest();
const ps = Buffer.from("\x00".repeat(190));
const db = Buffer.concat([ps, Buffer.from("\x01"), salt]);
const dbMask = MGF1.generate(mTickHash, db.length);
const maskedDb = MGF1.xor(db, dbMask); // so far so good
let maskedDbMsb = (new MGF1)._rjust(new BN(maskedDb.slice(0, 1), 2).toString(2), 8, "0");
maskedDbMsb = "0" + maskedDbMsb.substr(1);
maskedDb[0] = (new BN(maskedDbMsb, 2).toBuffer())[0];
return Buffer.concat([maskedDb, mTickHash, Buffer.from('BC', 'hex')]);
}
_modPow(base, power, mod) {
let result = new BN(1);
while( power > 0 ) {
result = power.and(new BN(1)) == 1 ? (result.mul(base)).mod(mod) : result;
base = (base.mul(base)).mod(mod);
power = power.shrn(1);
}
return result;
}
};

View File

@@ -1,67 +0,0 @@
'use strict'
const crypto = require("crypto");
const BN = require('bn.js');
module.exports = class MGF1 {
constructor() {
this._len = 32;
}
/**
*
* @param {Buffer} seed
* @param {Number} masklen
*
* @returns Buffer
*/
static generate(seed, masklen) {
const mgf1 = new MGF1();
if ( masklen > 4294967296 * this._len) {
throw new Error('Mask too long');
}
const b = [];
for (let i = 0; i < mgf1._divceil(masklen, mgf1._len); i++) {
b[i] = crypto.createHash('sha256').update(Buffer.concat([seed, mgf1._i2osp(i, 4)])).digest();
}
return (Buffer.concat(b)).slice(0, masklen);
}
static xor(a, b) {
if ( a.length != b.length ) {
throw new Error('Different length for a and b');
}
for ( let i = 0; i < a.length; i++ ) {
a[i] ^= b[i];
}
return a;
}
_divceil(a, b) {
return ~~((a + b - 1) / b);
}
_i2osp(x, len) {
if ( x >= 256 ** len ) {
throw new Error('Integer too large');
}
return Buffer.from(this._rjust( (Buffer.from((new BN(x)).toArray('be', 4)).toString()).replace(/\x00/gi, ''), len, "\x00" ));
}
_rjust( string, width, padding ) {
padding = padding || " ";
padding = padding.substr( 0, 1 );
if ( string.length < width )
return padding.repeat( width - string.length ) + string;
else
return string;
}
}

View File

@@ -1,57 +0,0 @@
'use strict';
const zlib = require('zlib');
const crypto = require("crypto");
const DOMParser = require("xmldom").DOMParser;
const XMLSerializer = require("xmldom").XMLSerializer;
const xpath = require("xpath");
module.exports = class Response {
constructor(client, data) {
this.client = client;
this.doc = new DOMParser().parseFromString(data, 'text/xml');
};
isSegmented() {
const select = xpath.useNamespaces({'xmlns': "urn:org:ebics:H004"});
const node = select("//xmlns:header/xmlns:mutable/xmlns:SegmentNumber", this.doc);
return node.length ? true: false;
}
isLastSegment() {
const select = xpath.useNamespaces({'xmlns': "urn:org:ebics:H004"});
const node = select("//xmlns:header/xmlns:mutable/*[@lastSegment='true']", this.doc);
return node.length ? true: false;
}
orderData() {
const orderData = this.doc.getElementsByTagNameNS("urn:org:ebics:H004", "OrderData")[0].textContent;
const decipher = crypto.createDecipheriv('aes-128-cbc', this.transactionKey(), Buffer.from([0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,])).setAutoPadding(false);
const data = Buffer.from(decipher.update(orderData, 'base64', 'binary') + decipher.final('binary'), 'binary');
return zlib.inflateSync(data).toString();
}
transactionKey() {
const keyNodeText = this.doc.getElementsByTagNameNS("urn:org:ebics:H004", "TransactionKey")[0].textContent;
const tkEncrypted = Buffer.from(keyNodeText, 'base64');
this.client.e().key.setOptions({encryptionScheme: 'pkcs1'});
return this.client.e().key.decrypt(tkEncrypted);
}
transactionId() {
const select = xpath.useNamespaces({'xmlns': "urn:org:ebics:H004"});
const node = select("//xmlns:header/xmlns:static/xmlns:TransactionID", this.doc);
return node.length ? node[0].textContent : '';
}
toXML() {
return new XMLSerializer().serializeToString(this.doc);
}
};

View File

@@ -1,103 +0,0 @@
'use strict';
const crypto = require("crypto");
const DOMParser = require("xmldom").DOMParser;
const XMLSerializer = require("xmldom").XMLSerializer;
const select = require("xpath.js");
const c14n = require('xml-crypto/lib/c14n-canonicalization').C14nCanonicalization;
module.exports = class Signer {
/**
* Contructor.
*
* @param {Client} client
* @param {String} data
*/
constructor(client, data) {
/**
* The main client
*
* @type {Signer}
*/
this.client = client;
/**
* Request data - generated xml
*
* @type {...}
*/
this.doc = new DOMParser().parseFromString(data, 'text/xml');
}
_junk() {
this.digest();
this.sign();
// console.log(this.toXML());
/* const headerSet = select(this.doc, "//*[@authenticate='true']").map(x => {
// x.setAttribute('xmlns:ds', 'http://www.w3.org/2000/09/xmldsig#');
return new c14n().process(x);
}).join();
const can = headerSet.replace('xmlns="urn:org:ebics:H004"', 'xmlns="urn:org:ebics:H004" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"');
const hash = crypto.createHash('sha256');
hash.update(can);
const digester = hash.digest('base64').trim();
if ( this.doc.getElementsByTagName("ds:DigestValue")[0] )
this.doc.getElementsByTagName("ds:DigestValue")[0].textContent = digester; */
/* const nodeSet = select(this.doc, "//ds:SignedInfo");
const canonicalized = nodeSet.map(x => {
const g = x.toString();
const res = new c14n().process(x);
return res;
}).join();
const canonicalizedString = canonicalized.replace('xmlns:ds="http://www.w3.org/2000/09/xmldsig#"', 'xmlns="urn:org:ebics:H004" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"');
// const SIGN = crypto.createSign('RSA-SHA256');
// SIGN.update(canonicalizedString);
// const key = SIGN.sign(this.client.x().key.exportKey("pkcs1-private-pem"), 'base64');
const f = this.client.x().key.sign(canonicalizedString, 'base64');
if ( this.doc.getElementsByTagName("ds:SignatureValue")[0] ) {
this.doc.getElementsByTagName("ds:SignatureValue")[0].textContent = f;
} */
}
digest() {
// get the xml node, where the digested value is supposed to be
const nodeDigestValue = this.doc.getElementsByTagName("ds:DigestValue")[0];
const nodes = select(this.doc, "//*[@authenticate='true']");
// canonicalize the node that has authenticate='true' attribute
const contentToDigest = select(this.doc, "//*[@authenticate='true']")
.map(x => {
const aaaa = x.toString();
return new c14n().process(x)
}).join("");
// fix the canonicalization
const fixedContent = contentToDigest.replace(/xmlns="urn:org:ebics:H004"/g, 'xmlns="urn:org:ebics:H004" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"');
if (nodeDigestValue) {
nodeDigestValue.textContent = crypto.createHash('sha256').update(fixedContent).digest('base64').trim();
}
};
sign() {
const nodeSignatureValue = this.doc.getElementsByTagName("ds:SignatureValue")[0];
if (nodeSignatureValue) {
const contentToSign = (new c14n().process(select(this.doc, "//ds:SignedInfo")[0])).replace('xmlns:ds="http://www.w3.org/2000/09/xmldsig#"', 'xmlns="urn:org:ebics:H004" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"');
nodeSignatureValue.textContent = this.client.x().key.sign(contentToSign, 'base64');
}
}
toXML() {
return new XMLSerializer().serializeToString(this.doc);
}
};

View File

@@ -2,11 +2,17 @@
const packageJson = require('../package.json');
const name = 'eCollect Node Ebics Client';
const version = packageJson.version;
const name = 'Node Ebics Client';
const { version } = packageJson;
const orderOperations = {
ini: 'INI',
upload: 'UPLOAD',
download: 'DOWNLOAD',
};
module.exports = {
name,
version,
productString: `${name} ${version}`,
};
name,
version,
orderOperations,
productString: `${name} ${version}`,
};

93
lib/crypto/Crypto.js Normal file
View File

@@ -0,0 +1,93 @@
'use strict';
const crypto = require('crypto');
const BN = require('bn.js');
const mgf1 = require('./MGF1');
const modPow = (base, power, mod) => {
let result = new BN(1);
while (power > 0) {
result = power.and(new BN(1)) == 1 ? (result.mul(base)).mod(mod) : result; // eslint-disable-line
base = (base.mul(base)).mod(mod);
power = power.shrn(1);
}
return result;
};
const emsaPSS = (msg, salt) => {
const eightNullBytes = Buffer.from('\x00'.repeat(8));
const digestedMsg = crypto.createHash('sha256').update(msg).digest();
const mTickHash = crypto.createHash('sha256').update(Buffer.concat([eightNullBytes, digestedMsg, salt]), 'binary').digest();
const ps = Buffer.from('\x00'.repeat(190));
const db = Buffer.concat([ps, Buffer.from('\x01'), salt]);
const dbMask = mgf1.generate(mTickHash, db.length);
const maskedDb = mgf1.xor(db, dbMask);
let maskedDbMsb = mgf1.rjust(new BN(maskedDb.slice(0, 1), 2).toString(2), 8, '0');
maskedDbMsb = `0${maskedDbMsb.substr(1)}`;
maskedDb[0] = (new BN(maskedDbMsb, 2).toBuffer())[0]; // eslint-disable-line
return Buffer.concat([maskedDb, mTickHash, Buffer.from('BC', 'hex')]);
};
module.exports = class Crypto {
static digestPublicKey(key) {
const str = [key.e('hex').replace(/^(0+)/g, ''), key.n('hex').replace(/^(0+)/g, '')].map(x => x.toLowerCase()).join(' ');
return crypto.createHash('sha256').update(str).digest('base64').trim();
}
static publicEncrypt(key, data) {
return crypto.publicEncrypt({
key: key.toPem(),
padding: crypto.constants.RSA_PKCS1_PADDING,
}, data);
}
static privateDecrypt(key, data) {
return crypto.privateDecrypt({
key: key.toPem(),
padding: crypto.constants.RSA_PKCS1_PADDING,
}, data);
}
static privateSign(key, data, outputEncoding = 'base64') {
const signer = crypto.createSign('SHA256');
return signer.update(data).sign(key.toPem(), outputEncoding);
}
static sign(key, msg, salt = crypto.randomBytes(32)) {
const base = new BN(emsaPSS(msg, salt));
const power = new BN(key.d());
const mod = new BN(key.n());
return (modPow(base, power, mod)).toBuffer().toString('base64');
}
static pad(d) {
const dLen = d.length;
const len = 16 * (Math.trunc(dLen / 16) + 1);
return Buffer.concat([d, Buffer.from(Buffer.from([0]).toString().repeat(len - dLen - 1)), Buffer.from([len - dLen])]);
}
static digestWithHash(data, algorith = 'sha256') {
return crypto.createHash(algorith).update(data).digest();
}
static nonce(outputEncoding = 'hex') {
return crypto.randomBytes(16).toString(outputEncoding);
}
static timestamp() {
return new Date().toISOString();
}
};

48
lib/crypto/MGF1.js Normal file
View File

@@ -0,0 +1,48 @@
'use strict';
const crypto = require('crypto');
const BN = require('bn.js');
const MFG_LEN = 32;
const divceil = (a, b) => ~~(((a + b) - 1) / b); // eslint-disable-line no-bitwise
const rjust = (string, width, padding) => {
padding = padding || ' ';
padding = padding.substr(0, 1);
if (string.length < width)
return padding.repeat(width - string.length) + string;
return string;
};
const xor = (a, b) => {
if (a.length !== b.length)
throw new Error('Different length for a and b');
for (let i = 0; i < a.length; i++)
a[i] ^= b[i]; // eslint-disable-line no-bitwise
return a;
};
const i2osp = (x, len) => {
if (x >= 256 ** len)
throw new Error('Integer too large');
return Buffer.from(rjust((Buffer.from((new BN(x)).toArray('be', 4)).toString()).replace(/\x00/gi, ''), len, '\x00')); // eslint-disable-line no-control-regex
};
module.exports = {
generate(seed, masklen) {
if (masklen > 4294967296 * MFG_LEN)
throw new Error('Mask too long');
const b = [];
for (let i = 0; i < divceil(masklen, MFG_LEN); i++)
b[i] = crypto.createHash('sha256').update(Buffer.concat([seed, i2osp(i, 4)])).digest();
return (Buffer.concat(b)).slice(0, masklen);
},
xor,
rjust,
};

138
lib/keymanagers/Key.js Normal file
View File

@@ -0,0 +1,138 @@
'use strict';
const {
pki: {
rsa,
publicKeyToPem,
privateKeyToPem,
publicKeyFromPem,
privateKeyFromPem,
},
jsbn: {
BigInteger,
},
} = require('node-forge');
const getKeyType = (str) => {
const matches = str.match(/(PRIVATE|PUBLIC) KEY/);
if (!matches)
return null;
return matches[1].toLowerCase();
};
const keyFromPem = (pem) => {
const type = getKeyType(pem);
const isPublic = type === 'public';
const key = isPublic ? publicKeyFromPem(pem) : privateKeyFromPem(pem);
return {
isPublic,
key,
};
};
/**
* Creates a public key from modulus and exponent
* @param {Buffer} mod - the modulus
* @param {Buffer} exp - the exponent
*/
const keyFromModAndExp = (mod, exp) => {
const bnMod = new BigInteger(mod.toString('hex'), 16);
const bnExp = new BigInteger(exp.toString('hex'), 16);
return {
key: rsa.setPublicKey(bnMod, bnExp),
isPublic: true,
};
};
module.exports = class Key {
constructor({
pem = null, mod = null, exp = null, size = 2048,
} = {}) {
// generate new private key
if (!pem && !mod && !exp) {
const keyPair = rsa.generateKeyPair(size);
this.keyIsPublic = false;
this.privateKey = keyPair.privateKey;
this.publicKey = keyPair.publicKey;
return;
}
// new key from pem string
if (pem) {
const { key, isPublic } = keyFromPem(pem);
this.keyIsPublic = isPublic;
this.privateKey = isPublic ? null : key;
this.publicKey = isPublic ? key : null;
return;
}
// new key from mod and exp
if (mod && exp) {
const { key, isPublic } = keyFromModAndExp(mod, exp);
this.keyIsPublic = isPublic;
this.privateKey = isPublic ? null : key;
this.publicKey = isPublic ? key : null;
return;
}
// not good
throw new Error(`Can not create key without ${!mod ? 'modulus' : 'exponent'}.`);
}
static generate(size = 2048) {
return new Key({ size });
}
static importKey({ mod, exp }) {
return new Key({ mod, exp });
}
n(to = 'buff') {
const key = this.keyIsPublic ? this.publicKey : this.privateKey;
const keyN = Buffer.from(key.n.toByteArray());
return to === 'hex' ? keyN.toString('hex', 1) : keyN;
}
e(to = 'buff') {
const key = this.keyIsPublic ? this.publicKey : this.privateKey;
const eKey = Buffer.from(key.e.toByteArray());
return to === 'hex' ? eKey.toString('hex') : eKey;
}
d() {
if (this.keyIsPublic)
throw new Error('Can not get d component out of public key.');
return Buffer.from(this.privateKey.d.toByteArray());
}
isPrivate() {
return !this.keyIsPublic;
}
isPublic() {
return this.keyIsPublic;
}
// eslint-disable-next-line class-methods-use-this
size() {
const keyN = this.n('hex');
const bn = new BigInteger(keyN, 16);
return bn.bitLength();
}
toPem() {
return this.keyIsPublic ? publicKeyToPem(this.publicKey) : privateKeyToPem(this.privateKey);
}
};

63
lib/keymanagers/Keys.js Normal file
View File

@@ -0,0 +1,63 @@
'use strict';
const Key = require('./Key');
const keyOrNull = (key) => {
if (key instanceof Key)
return key;
return key ? new Key({ pem: key }) : null;
};
module.exports = class Keys {
constructor({
A006,
E002,
X002,
bankX002,
bankE002,
}) {
this.keys = {
A006: keyOrNull(A006),
E002: keyOrNull(E002),
X002: keyOrNull(X002),
bankX002: keyOrNull(bankX002),
bankE002: keyOrNull(bankE002),
};
}
static generate() {
const keys = {};
Object.keys({ A006: '', X002: '', E002: '' }).forEach((key) => {
keys[key] = Key.generate(); // Key().generate();
});
return new Keys(keys);
}
setBankKeys(bankKeys) {
this.keys.bankX002 = new Key(bankKeys.bankX002); // Key().importKey(bankKeys.bankX002);
this.keys.bankE002 = new Key(bankKeys.bankE002); // Key().importKey(bankKeys.bankE002);
}
a() {
return this.keys.A006;
}
e() {
return this.keys.E002;
}
x() {
return this.keys.X002;
}
bankX() {
return this.keys.bankX002;
}
bankE() {
return this.keys.bankE002;
}
};

View File

@@ -0,0 +1,68 @@
'use strict';
const crypto = require('crypto');
const Keys = require('./Keys');
const encrypt = (data, algorithm, passphrase) => {
const cipher = crypto.createCipher(algorithm, passphrase);
const encrypted = cipher.update(data, 'utf8', 'hex') + cipher.final('hex');
return Buffer.from(encrypted).toString('base64');
};
const decrypt = (data, algorithm, passphrase) => {
data = (Buffer.from(data, 'base64')).toString();
const decipher = crypto.createDecipher(algorithm, passphrase);
const decrypted = decipher.update(data, 'hex', 'utf8') + decipher.final('utf8');
return decrypted;
};
module.exports = (keysStorage, passphrase, algorithm = 'aes-256-cbc') => {
const storage = keysStorage;
const pass = passphrase;
const algo = algorithm;
// const createIfNone = createIfNone;
return {
generate(save = true) {
const keys = Keys.generate();
if (save) {
this.write(keys);
return this;
}
return keys;
},
write(keysObject) {
keysObject = keysObject.keys;
Object.keys(keysObject).map((key) => {
keysObject[key] = keysObject[key] === null ? null : keysObject[key].toPem();
return key;
});
storage.write(encrypt(JSON.stringify(keysObject), algo, pass));
return this;
},
setBankKeys(bankKeys) {
const keys = this.keys();
keys.setBankKeys(bankKeys);
this.write(keys);
},
keys() {
const keysString = storage.read();
return new Keys(JSON.parse(decrypt(keysString, algo, pass)));
},
};
};

View File

@@ -0,0 +1,24 @@
'use strict';
const crypto = require('crypto');
const encrypt = (data, algorithm, passphrase) => {
const cipher = crypto.createCipher(algorithm, passphrase);
const encrypted = cipher.update(data, 'utf8', 'hex') + cipher.final('hex');
return Buffer.from(encrypted).toString('base64');
};
const decrypt = (data, algorithm, passphrase) => {
data = (Buffer.from(data, 'base64')).toString();
const decipher = crypto.createDecipher(algorithm, passphrase);
const decrypted = decipher.update(data, 'hex', 'utf8') + decipher.final('utf8');
return decrypted;
};
module.exports = ({
passphrase,
algorithm = 'aes-256-cbc',
}) => ({
encrypt: data => encrypt(data, algorithm, passphrase),
decrypt: data => decrypt(data, algorithm, passphrase),
});

View File

@@ -1,22 +0,0 @@
'use strict';
const Response = require('../Response');
module.exports = class ParseResponse {
constructor(client, data) {
this.client = client;
this.data = data;
};
static go (client, data) {
const parseRensponse = new ParseResponse(client, data);
const response = new Response(client, data);
// TODO:
// raise error if any
this.data = response.doc;
return response;
}
};

View File

@@ -1,22 +0,0 @@
'use strict';
const Signer = require('../Signer');
module.exports = class XMLSign {
constructor(client, data) {
this.client = client;
this.data = data;
};
static go (client, data) {
const xmlSigner = new XMLSign(client, data);
const signer = new Signer(client, data);
signer.digest();
signer.sign();
this.data = signer.toXML();
return this.data;
}
};

View File

@@ -0,0 +1,11 @@
'use strict';
const H004Response = require('../orders/H004/response');
module.exports = {
version(v) {
if (v.toUpperCase() === 'H004') return H004Response;
throw Error('Error from middleware/response.js: Invalid version number');
},
};

View File

@@ -0,0 +1,13 @@
'use strict';
const H004Serializer = require('../orders/H004/serializer');
module.exports = {
use(order, client) {
const { version } = order;
if (version.toUpperCase() === 'H004') return H004Serializer.use(order, client);
throw Error('Error middleware/serializer.js: Invalid version number');
},
};

11
lib/middleware/signer.js Normal file
View File

@@ -0,0 +1,11 @@
'use strict';
const H004Signer = require('../orders/H004/signer');
module.exports = {
version(v) {
if (v.toUpperCase() === 'H004') return H004Signer;
throw Error('Error from middleware/signer.js: Invalid version number');
},
};

View File

@@ -1,50 +0,0 @@
'use strict';
const GenericOrder = require('./GenericOrder');
module.exports = class C52 extends GenericOrder {
constructor (client, from, to) {
super(client);
this._from = from;
this._to = to;
this._schema.header = {
"@" : { authenticate: true },
static: {
HostID : this.hostId,
Nonce : this.nonce(),
Timestamp: this.timestamp(),
PartnerID: this.partnerId,
UserID : this.userId,
Product : {
"@": { Language: "de" },
"#": this.productString,
},
OrderDetails: {
OrderType : "C52",
OrderAttribute : "DZHNN",
StandardOrderParams: {
DateRange: {
Start: this._from,
End : this._to
}
},
},
BankPubKeyDigests: {
Authentication: {
"@": { Version: "X002", Algorithm: "http://www.w3.org/2001/04/xmlenc#sha256" },
"#": this.client.bankX().publicDigest()
},
Encryption: {
"@": { Version: "E002", Algorithm: "http://www.w3.org/2001/04/xmlenc#sha256" },
"#": this.client.bankE().publicDigest()
}
},
SecurityMedium: "0000"
},
mutable: {
TransactionPhase: "Initialisation"
}
};
};
};

View File

@@ -1,180 +0,0 @@
'use strict';
// const randHex = require('../../lib/utils').randHex;
const crypto = require("crypto");
const js2xmlparser = require('js2xmlparser');
const consts = require('../consts');
module.exports = class GenericOrder {
constructor(client) {
this.client = client;
this.hostId = client.hostId;
this.userId = client.userId;
this.partnerId = client.partnerId;
this.transactionId = '';
this.xmlOptions = {
declaration: {
include: true,
encoding: "utf-8"
},
format: {
doubleQuotes: true,
indent: '',
newline: '',
pretty: true
}
};
this._schema = {
"@": {
"xmlns:ds": "http://www.w3.org/2000/09/xmldsig#",
xmlns: "urn:org:ebics:H004",
Version: "H004",
Revision: "1"
},
header: {},
AuthSignature: this.authSignature(),
body: {}
};
}
authSignature() {
return {
"ds:SignedInfo": {
"ds:CanonicalizationMethod": {
"@": {
Algorithm:
"http://www.w3.org/TR/2001/REC-xml-c14n-20010315"
}
},
"ds:SignatureMethod": {
"@": {
Algorithm:
"http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"
}
},
"ds:Reference": {
"@": { URI: "#xpointer(//*[@authenticate='true'])" },
"ds:Transforms": {
"ds:Transform": {
"@": {
Algorithm:
"http://www.w3.org/TR/2001/REC-xml-c14n-20010315"
}
}
},
"ds:DigestMethod": {
"@": {
Algorithm:
"http://www.w3.org/2001/04/xmlenc#sha256"
}
},
"ds:DigestValue": {}
}
},
"ds:SignatureValue": {}
};
}
get schema() {
return this._schema;
}
get productString() {
return consts.productString;
}
nonce() {
return crypto.randomBytes(16).toString('hex');
}
timestamp() {
return new Date().toISOString();
}
root() {
return "ebicsRequest";
}
toReceiptXML() {
const xmlObj = {
"@": {
"xmlns:ds": "http://www.w3.org/2000/09/xmldsig#",
xmlns: "urn:org:ebics:H004",
Version: "H004",
Revision: "1"
},
header: {
"@": { authenticate: true },
static: {
HostID: this.hostId,
TransactionID: this.transactionId
},
mutable: {
TransactionPhase: 'Receipt',
}
},
AuthSignature: this.authSignature(),
body: {
TransferReceipt: {
"@": { authenticate: true },
ReceiptCode: 0
}
}
};
return js2xmlparser.parse(this.root(), xmlObj, this.xmlOptions);
}
toTransferXML(){
const xmlObj = {
"@": {
"xmlns:ds": "http://www.w3.org/2000/09/xmldsig#",
xmlns: "urn:org:ebics:H004",
Version: "H004",
Revision: "1"
},
header: {
"@": { authenticate: true },
static: {
HostID: this.hostId,
TransactionID: this.transactionId
},
mutable: {
TransactionPhase: 'Transfer',
SegmentNumber: {
"@": { lastSegment: true },
"#": 1
}
}
},
AuthSignature: this.authSignature(),
body: {
DataTransfer: {
OrderData: this.encryptedOrderData()
}
}
};
return js2xmlparser.parse(this.root(), xmlObj, this.xmlOptions);
}
encryptedOrderData() {
}
toXML() {
return js2xmlparser.parse(this.root(), this._schema, this.xmlOptions);
}
};

View File

@@ -1,79 +0,0 @@
'use strict';
const zlib = require('zlib');
const crypto = require("crypto");
const js2xmlparser = require('js2xmlparser');
const GenericOrder = require('./GenericOrder');
module.exports = class GenericUploadOrder extends GenericOrder {
constructor(client, document) {
super(client);
this._document = document;
this._key = crypto.randomBytes(16);
this._schema.body = {
DataTransfer: {
DataEncryptionInfo: {
"@": { authenticate: true },
EncryptionPubKeyDigest: {
"@": { Version: "E002", Algorithm: "http://www.w3.org/2001/04/xmlenc#sha256" },
"#": this.client.bankE().publicDigest()
},
TransactionKey: this.client.bankE().publicEncrypt(this._key).toString('base64'),
},
SignatureData: {
"@": { authenticate: true },
"#": this.encryptedOrderSignature()
}
}
};
};
orderSignature() {
const xmlObj = {
"@": {
xmlns: "http://www.ebics.org/S001",
"xmlns:xsi": "http://www.w3.org/2001/XMLSchema-instance",
"xsi:schemaLocation": "http://www.ebics.org/S001 http://www.ebics.org/S001/ebics_signature.xsd"
},
OrderSignatureData: {
SignatureVersion: "A006",
SignatureValue: this.signatureValue(),
PartnerID: this.partnerId,
UserID: this.userId
}
};
return js2xmlparser.parse('UserSignatureData', xmlObj, this.xmlOptions);
};
signatureValue() {
const digested = crypto.createHash('sha256').update(this._document.replace(/\n|\r/g, "")).digest();
return this.client.a().sign(digested);
};
encryptedOrderData() {
const dst = zlib.deflateSync(this._document.replace(/\r|\n/g, ""));
const cipher = crypto.createCipheriv('aes-128-cbc', this._key, Buffer.from([0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,])).setAutoPadding(false);
return Buffer.concat([cipher.update(this._pad(dst)), cipher.final()]).toString('base64');
}
encryptedOrderSignature() {
const dst = zlib.deflateSync(this.orderSignature());
const cipher = crypto.createCipheriv('aes-128-cbc', this._key, Buffer.from([0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,])).setAutoPadding(false);
return Buffer.concat([cipher.update(this._pad(dst)), cipher.final()]).toString('base64');
};
_pad(d) {
const dLen = d.length;
const len = 16 * ( Math.trunc(dLen / 16) + 1 );
return Buffer.concat([d, Buffer.from(Buffer.from([0]).toString().repeat(len - dLen - 1)), Buffer.from([len-dLen])]);
}
};

313
lib/orders/H004/errors.js Normal file
View File

@@ -0,0 +1,313 @@
'use strict';
const errors = {
technical: {
'000000': {
symbol: 'EBICS_OK',
short_text: 'OK',
meaning: 'No technical errors occurred during processing of the EBICS request',
},
'011000': {
symbol: 'EBICS_DOWNLOAD_POSTPROCESS_DONE',
short_text: 'Positive acknowledgement received',
meaning: "After receipt of a positive acknowledgement the download task was finished at the server's end and the EBICS transaction ended.",
},
'011001': {
symbol: 'EBICS_DOWNLOAD_POSTPROCESS_SKIPPED',
short_text: 'Negative acknowledgement received',
meaning: "After receipt of a negative acknowledgement the transaction was ended at the server's end without finishing the download task",
},
'011101': {
symbol: 'EBICS_TX_SEGMENT_NUMBER_UNDERRUN',
short_text: 'Segment number not reached',
meaning: 'The total number of segments transmitted during transaction initialisation was not reached (i.e. the attribute @lastSegment was set to "true" before the specified segment number was reached)',
},
'031001': {
symbol: 'EBICS_ORDER_PARAMS_IGNORED',
short_text: 'Unknown order parameters are ignored',
meaning: 'E.g. OrderParams for Upload specified',
},
'061001': {
symbol: 'EBICS_AUTHENTICATION_FAILED',
short_text: 'Authentication signature error',
meaning: 'Verification of the authentication signature was not successful',
},
'061002': {
symbol: 'EBICS_INVALID_REQUEST',
short_text: 'Message not EBICSconformant',
meaning: 'The syntax of the received message does not conform with EBICS specifications',
},
'061099': {
symbol: 'EBICS_INTERNAL_ERROR',
short_text: 'Internal EBICS error',
meaning: 'An internal error occurred during',
},
'061101': {
symbol: 'EBICS_TX_RECOVERY_SYNC',
short_text: 'Synchronisation necessary',
meaning: "Recovery of the transaction requires synchronisation between the customer system and the bank system Continuation of the transaction using the recovery point from the bank system's EBICS response",
},
'091002': {
symbol: 'EBICS_INVALID_USER_OR_USER_STATE',
short_text: 'Subscriber unknown or subscriber state inadmissible',
meaning: 'Either the initiating party is not known to the bank system or the subscriber state that is stored in the bank of the initiating party is inadmissible with regard to the order type',
},
'091003': {
symbol: 'EBICS_USER_UNKNOWN',
short_text: 'Subscriber unknown',
meaning: 'The initiating party is not known to the bank system',
},
'091004': {
symbol: 'EBICS_INVALID_USER_STATE',
short_text: 'Subscriber state unknown',
meaning: 'The subscriber state of the initiating party that is stored in the bank system is inadmissible with regard to the order type',
},
'091005': {
symbol: 'EBICS_INVALID_ORDER_TYPE',
short_text: 'Order type inadmissible',
meaning: 'The order type is unknown or not approved for use with EBICS',
},
'091006': {
symbol: 'EBICS_UNSUPPORTED_ORDER_TYPE',
short_text: 'Order type not supported',
meaning: 'The selected order type is optional with EBICS and is not supported by the financial institution',
},
'091007': {
symbol: 'EBICS_DISTRIBUTED_SIGNATURE_AUTHORISATION_FAILED',
short_text: 'Subscriber possesses no authorisation of signature for the referenced order in the VEU administration (Request recent signature folder)',
meaning: 'Retrieve recent signature folder with permissible orders of order type HVU (or HVZ, respectively)',
},
'091008': {
symbol: 'EBICS_BANK_PUBKEY_UPDATE_REQUIRED',
short_text: 'Bank key invalid',
meaning: 'The public bank key that is available to the subscriber is invalid',
},
'091009': {
symbol: 'EBICS_SEGMENT_SIZE_EXCEEDED',
short_text: 'Segment size exceeded',
meaning: 'The specified size of an upload order data segment (in the case of H003: 1 MB) has been exceeded',
},
'091010': {
symbol: 'EBICS_INVALID_XML',
short_text: 'XML invalid according to EBICS XML schema',
meaning: 'XML validation with EBICS schema failed or XML not well-formed',
},
'091011': {
symbol: 'EBICS_INVALID_HOST_ID',
short_text: "The transmitted HostID is unknown on the bank's side",
meaning: "The transmitted HostID is unknown on the bank's side. The use of this code is only provided for the HEV request Check the used HostID and correct it. Consultation with the bank, if necessary",
},
'091101': {
symbol: 'EBICS_TX_UNKNOWN_TXID',
short_text: 'Transaction ID invalid',
meaning: 'The supplied transaction ID is invalid',
},
'091102': {
symbol: 'EBICS_TX_ABORT',
short_text: 'Transaction cancelled',
meaning: "The transaction was cancelled at the server's end since recovery of the transaction is not supported or is no longer possible due to the recovery counter being too high",
},
'091103': {
symbol: 'EBICS_TX_MESSAGE_REPLAY',
short_text: 'Suspected Message replay (wrong time/time zone or nonce error)',
meaning: 'A message replay has been identified (Nonce/Timestamp pair doubled) or the difference of clock time between client and server exceeds the (parametrisable) tolerance limit',
},
'091104': {
symbol: 'EBICS_TX_SEGMENT_NUMBER_EXCEEDED',
short_text: 'Segment number exceeded',
meaning: 'The total segment number from transaction initialisation was exceeded, i.e. the attribute @lastSegment was set to "false" when the last segment was transmitted',
},
'091112': {
symbol: 'EBICS_INVALID_ORDER_PARAMS',
short_text: 'Invalid order parameters',
meaning: 'The content of OrderParams is invalid, e.g. if starting off behind the end in case of StandardOrderParams, or, in case of HVT, fetchOffset is higher than NumOrderInfos (total number of particular order information of an order)',
},
'091113': {
symbol: 'EBICS_INVALID_REQUEST_CONTENT',
short_text: 'Message content semantically not compliant to EBICS',
meaning: 'The received message complies syntactically EBICS XML schema, but not semantically to the EBICS guidelines, e.g. IZV upload with UZHNN requires NumSegments = 0',
},
'091117': {
symbol: 'EBICS_MAX_ORDER_DATA_SIZE_EXCEEDED',
short_text: 'The bank system does not support the requested order size',
meaning: 'Upload or download of an order file of improper size (e.g. for HVT, IZV, STA)',
},
'091118': {
symbol: 'EBICS_MAX_SEGMENTS_EXCEEDED',
short_text: 'Submitted number of segments for upload is too high',
meaning: 'The bank system does not support the specified total number of segments for upload',
},
'091119': {
symbol: 'EBICS_MAX_TRANSACTIONS_EXCEEDED',
short_text: 'Maximum number of parallel transactions per customer is exceeded',
meaning: 'The maximum number of parallel EBICS transactions defined in the bank system for the customer has been exceeded',
},
'091120': {
symbol: 'EBICS_PARTNER_ID_MISMATCH',
short_text: 'The partner ID (=customer ID) of the ES file is not identical to the partner ID (=customer ID) of the submitter.',
meaning: "On verifying the submitted signatures a partner ID was found in the document UserSignatureData that is not identical to the subscriber's partner ID in the request header",
},
'091121': {
symbol: 'EBICS_INCOMPATIBLE_ORDER_ATTRIBUTE',
short_text: 'The specified order attribute is not compatible with the order in the bank system',
meaning: 'Case 1) File with order attribute "DZHNN" or "OZHNN" submitted with an orderId or Case 2) File with order attribute "UZHNN" submitted without an orderId or with orderID which is already used for "DZHNN" File with order attribute "DZHNN" submitted with an orderId',
},
},
business: {
'000000': {
symbol: 'EBICS_OK',
short_text: 'OK',
meaning: 'No technical errors occurred during processing of the EBICS request',
},
'011301': {
symbol: 'EBICS_NO_ONLINE_CHECKS',
short_text: 'Optional preliminary verification is not supported by the bank system',
},
'091001': {
symbol: 'EBICS_DOWNLOAD_SIGNED_ONLY',
short_text: 'The bank system only supports bank-technically signed download order data for the order in question',
},
'091002': {
symbol: 'EBICS_DOWNLOAD_UNSIGNED_ONLY',
short_text: 'The bank system only supports unsigned download order data for the order in question',
},
'090003': {
symbol: 'EBICS_AUTHORISATION_ORDER_TYPE_FAILED',
short_text: 'The subscriber is not entitled to submit orders of the selected order type',
},
'090004': {
symbol: 'EBICS_INVALID_ORDER_DATA_FORMAT',
short_text: 'The transferred order data does not correspond with the specified format',
},
'090005': {
symbol: 'EBICS_NO_DOWNLOAD_DATA_AVAILABLE',
short_text: 'No data are available at present for the selected download order type',
},
'090006': {
symbol: 'EBICS_UNSUPPORTED_REQUEST_FOR_ORDER_INSTANCE',
short_text: 'The bank system does not support the selected order request for the concrete business transaction associated with this order',
},
'091105': {
symbol: 'EBICS_RECOVERY_NOT_SUPPORTED',
short_text: 'The bank system does not support Recovery',
},
'091111': {
symbol: 'EBICS_INVALID_SIGNATURE_FILE_FORMAT',
short_text: 'The submitted ES files do not comply with the defined format The ES file cannot be parsed syntactically (no business-related verification!)',
},
'091114': {
symbol: 'EBICS_ORDERID_UNKNOWN',
short_text: 'The submitted order number is unknown',
},
'091115': {
symbol: 'EBICS_ORDERID_ALREADY_EXISTS',
short_text: 'The submitted order number is already existent',
},
'091116': {
symbol: 'EBICS_PROCESSING_ERROR',
short_text: 'During processing of the EBICS request, other business-related errors have ocurred',
},
'091201': {
symbol: 'EBICS_KEYMGMT_UNSUPPORTED_VERSION_SIGNATURE',
short_text: 'The algorithm version of the bank-technical signature key is not supported by the financial institution (order types INI, HCS and PUB)',
},
'091202': {
symbol: 'EBICS_KEYMGMT_UNSUPPORTED_VERSION_AUTHENTICATION',
short_text: 'The algorithm version of theauthentication key is notsupported by the financialinstitution (order types HIA,HSA and HCA)',
},
'091203': {
symbol: 'EBICS_KEYMGMT_UNSUPPORTED_VERSION_ENCRYPTION',
short_text: 'The algorithm version of the encryption key is not supported by the financial institution (order types HIA, HSA and HCA) This error message is returned particularly when the process ID E001 is used which is invalid from schema version H003 on',
},
'091204': {
symbol: 'EBICS_KEYMGMT_KEYLENGTH_ERROR_SIGNATURE',
short_text: 'The key length of the banktechnical signature key is not supported by the financial institution (order types INI and PUB or HCS)',
},
'091205': {
symbol: 'EBICS_KEYMGMT_KEYLENGTH_ERROR_AUTHENTICATION',
short_text: 'The key length of the authentication key is not supported by the financial institution (order types HIA, HSA, HCS and HCA)',
},
'091206': {
symbol: 'EBICS_KEYMGMT_KEYLENGTH_ERROR_ENCRYPTION',
short_text: 'The key length of the encryption key is not supported by the financial institution (order types HIA, HSA, HCS and HCA)',
},
'091207': {
symbol: 'EBICS_KEYMGMT_NO_X509_SUPPORT',
short_text: 'The bank system does not support the evaluation of X.509 data (order types INI, HIA, HSA, PUB, HCA, HCS)',
},
'091208': {
symbol: 'EBICS_X509_CERTIFICATE_EXPIRED',
short_text: 'certificate is not valid because it has expired',
},
'091209': {
symbol: 'EBICS_X509_ERTIFICATE_NOT_VALID_YET',
short_text: 'certificate is not valid because it is not yet in effect',
},
'091210': {
symbol: 'EBICS_X509_WRONG_KEY_USAGE',
short_text: 'When verifying the certificate key usage, it has been detected that the certificate has not been issued for the current use. (only applies when key management order types are used)',
},
'091211': {
symbol: 'EBICS_X509_WRONG_ALGORITHM',
short_text: 'When verifying the certificate algorithm, it has been detected that the certificate has not been issued for the current use. (only applies when key management order types are used)',
},
'091212': {
symbol: 'EBICS_X509_INVALID_THUMBPRINT',
short_text: 'Reserved for next version',
},
'091213': {
symbol: 'EBICS_X509_CTL_INVALID',
short_text: 'When verifying the certificate, it has been detected that the certificate trust list (CTL) is not valid because, for example, it has expired.',
},
'091214': {
symbol: 'EBICS_X509_UNKNOWN_CERTIFICATE_AUTHORITY',
short_text: 'The chain cannot be verified due to an unknown certificate authority (CA) If OrderType = INI, PUB or HCS and X509v3 supported: The Reject of the Request is mandatory, if signature class <> "T"',
},
'091215': {
symbol: 'EBICS_X509_INVALID_POLICY',
short_text: 'Reserved for next version',
},
'091216': {
symbol: 'EBICS_X509_INVALID_BASIC_CONSTRAINTS',
short_text: 'Reserved for next version',
},
'091217': {
symbol: 'EBICS_ONLY_X509_SUPPORT',
short_text: 'With respect to certificates, the bank system only supports the evaluation of X.509 data',
},
'091218': {
symbol: 'EBICS_KEYMGMT_DUPLICATE_KEY',
short_text: 'During the key management request, it has been detected that the key or certificate sent for authentication or for encryption is the same as the signature key/certificate (INI, HIA, PUB, HCS,..)',
},
'091219': {
symbol: 'EBICS_CERTIFICATES_VALIDATION_ERROR',
short_text: 'The server is unable to match the certificate (ES key) with the previously declared information automatically.',
},
'091301': {
symbol: 'EBICS_SIGNATURE_VERIFICATION_FAILED',
short_text: 'Verification of the ES has failed In the case of asynchronouslyimplemented orders, the error can occur during preliminary verification.',
},
'091302': {
symbol: 'EBICS_ACCOUNT_AUTHORISATION_FAILED',
short_text: 'Preliminary verification of the account authorisation has failed',
},
'091303': {
symbol: 'EBICS_AMOUNT_CHECK_FAILED',
short_text: 'Preliminary verification of the account amount limit has failed',
},
'091304': {
symbol: 'EBICS_SIGNER_UNKNOWN',
short_text: 'A signatory of the order in question is not a valid subscriber.',
},
'091305': {
symbol: 'EBICS_INVALID_SIGNER_STATE',
short_text: 'The state of a signatory in the order in question is not admissible.',
},
'091306': {
symbol: 'EBICS_DUPLICATE_SIGNATURE',
short_text: 'The signatory has already signed the order on hand.',
},
},
};
module.exports = errors;

143
lib/orders/H004/response.js Normal file
View File

@@ -0,0 +1,143 @@
'use strict';
const zlib = require('zlib');
const crypto = require('crypto');
const Crypto = require('../../crypto/Crypto');
const { DOMParser, XMLSerializer } = require('xmldom');
const xpath = require('xpath');
const errors = require('./errors');
const DEFAULT_IV = Buffer.from(Array(16).fill(0, 0, 15));
const lastChild = (node) => {
let y = node.lastChild;
while (y.nodeType !== 1) y = y.previousSibling;
return y;
};
module.exports = (xml, keys) => ({
keys,
doc: new DOMParser().parseFromString(xml, 'text/xml'),
isSegmented() {
const select = xpath.useNamespaces({ xmlns: 'urn:org:ebics:H004' });
const node = select('//xmlns:header/xmlns:mutable/xmlns:SegmentNumber', this.doc);
return !!node.length;
},
isLastSegment() {
const select = xpath.useNamespaces({ xmlns: 'urn:org:ebics:H004' });
const node = select("//xmlns:header/xmlns:mutable/*[@lastSegment='true']", this.doc);
return !!node.length;
},
orderData() {
const orderDataNode = this.doc.getElementsByTagNameNS('urn:org:ebics:H004', 'OrderData');
if (!orderDataNode.length) return {};
const orderData = orderDataNode[0].textContent;
const decipher = crypto.createDecipheriv('aes-128-cbc', this.transactionKey(), DEFAULT_IV).setAutoPadding(false);
const data = Buffer.from(decipher.update(orderData, 'base64', 'binary') + decipher.final('binary'), 'binary');
return zlib.inflateSync(data);
},
transactionKey() {
const keyNodeText = this.doc.getElementsByTagNameNS('urn:org:ebics:H004', 'TransactionKey')[0].textContent;
return Crypto.privateDecrypt(this.keys.e(), Buffer.from(keyNodeText, 'base64'));
},
transactionId() {
const select = xpath.useNamespaces({ xmlns: 'urn:org:ebics:H004' });
const node = select('//xmlns:header/xmlns:static/xmlns:TransactionID', this.doc);
return node.length ? node[0].textContent : '';
},
orderId() {
const select = xpath.useNamespaces({ xmlns: 'urn:org:ebics:H004' });
const node = select('//xmlns:header/xmlns:mutable/xmlns:OrderID', this.doc);
return node.length ? node[0].textContent : '';
},
businessCode() {
const select = xpath.useNamespaces({ xmlns: 'urn:org:ebics:H004' });
const node = select('//xmlns:body/xmlns:ReturnCode', this.doc);
return node.length ? node[0].textContent : '';
},
businessSymbol(code) {
return errors.business[code].symbol;
},
businessShortText(code) {
return errors.business[code].short_text;
},
businessMeaning(code) {
return errors.business[code].meaning;
},
technicalCode() {
const select = xpath.useNamespaces({ xmlns: 'urn:org:ebics:H004' });
const node = select('//xmlns:header/xmlns:mutable/xmlns:ReturnCode', this.doc);
return node.length ? node[0].textContent : '';
},
technicalSymbol() {
const select = xpath.useNamespaces({ xmlns: 'urn:org:ebics:H004' });
const node = select('//xmlns:header/xmlns:mutable/xmlns:ReportText', this.doc);
return node.length ? node[0].textContent : '';
},
technicalShortText(code) {
return errors.technical[code].short_text;
},
technicalMeaning(code) {
return errors.technical[code].meaning;
},
bankKeys() {
const orderData = this.orderData().toString();
if (!Object.keys(orderData).length) return {};
const doc = new DOMParser().parseFromString(orderData, 'text/xml');
const select = xpath.useNamespaces({ xmlns: 'urn:org:ebics:H004' });
const keyNodes = select('//xmlns:PubKeyValue', doc);
const bankKeys = {};
if (!keyNodes.length) return {};
for (let i = 0; i < keyNodes.length; i++) {
const type = lastChild(keyNodes[i].parentNode).textContent;
const modulus = xpath.select(".//*[local-name(.)='Modulus']", keyNodes[i])[0].textContent;
const exponent = xpath.select(".//*[local-name(.)='Exponent']", keyNodes[i])[0].textContent;
const mod = Buffer.from(modulus, 'base64');
const exp = Buffer.from(exponent, 'base64');
bankKeys[`bank${type}`] = {
mod,
exp,
};
}
return bankKeys;
},
toXML() {
return new XMLSerializer().serializeToString(this.doc);
},
});

View File

@@ -0,0 +1,19 @@
'use strict';
const constants = require('../../consts');
const iniSerializer = require('./serializers/ini');
const downloadSerializer = require('./serializers/download');
const uploadSerializer = require('./serializers/upload');
module.exports = {
use(order, client) {
const operation = order.operation.toUpperCase();
if (operation === constants.orderOperations.ini) return iniSerializer.use(order, client);
if (operation === constants.orderOperations.download) return downloadSerializer.use(order, client);
if (operation === constants.orderOperations.upload) return uploadSerializer.use(order, client);
throw Error('Error from orders/orders.js: Wrong order version/type.');
},
};

View File

@@ -0,0 +1,66 @@
'use strict';
const js2xmlparser = require('js2xmlparser');
const Crypto = require('../../../crypto/Crypto');
const genericSerializer = require('./generic');
module.exports = {
async use(order, client) {
const keys = await client.keys();
const ebicsAccount = {
partnerId: client.partnerId,
userId: client.userId,
hostId: client.hostId,
};
const { orderDetails, transactionId } = order;
const {
rootName, xmlOptions, xmlSchema, receipt, transfer, productString,
} = genericSerializer(client.hostId, transactionId);
this.productString = productString;
this.rootName = rootName;
this.xmlOptions = xmlOptions;
this.xmlSchema = xmlSchema;
this.receipt = receipt;
this.transfer = transfer;
if (transactionId) return this.receipt();
this.xmlSchema.header = {
'@': { authenticate: true },
static: {
HostID: ebicsAccount.hostId,
Nonce: Crypto.nonce(),
Timestamp: Crypto.timestamp(),
PartnerID: ebicsAccount.partnerId,
UserID: ebicsAccount.userId,
Product: {
'@': { Language: 'en' },
'#': productString,
},
OrderDetails: orderDetails,
BankPubKeyDigests: {
Authentication: {
'@': { Version: 'X002', Algorithm: 'http://www.w3.org/2001/04/xmlenc#sha256' },
'#': Crypto.digestPublicKey(keys.bankX()),
},
Encryption: {
'@': { Version: 'E002', Algorithm: 'http://www.w3.org/2001/04/xmlenc#sha256' },
'#': Crypto.digestPublicKey(keys.bankE()),
},
},
SecurityMedium: '0000',
},
mutable: {
TransactionPhase: 'Initialisation',
},
};
return this;
},
toXML() {
return js2xmlparser.parse(this.rootName, this.xmlSchema, this.xmlOptions);
},
};

View File

@@ -0,0 +1,134 @@
'use strict';
const constants = require('../../../consts');
const rootName = 'ebicsRequest';
const rootAttributes = {
'xmlns:ds': 'http://www.w3.org/2000/09/xmldsig#',
xmlns: 'urn:org:ebics:H004',
Version: 'H004',
Revision: '1',
};
const header = {};
const authSignature = ({
'ds:SignedInfo': {
'ds:CanonicalizationMethod': {
'@': {
Algorithm:
'http://www.w3.org/TR/2001/REC-xml-c14n-20010315',
},
},
'ds:SignatureMethod': {
'@': {
Algorithm:
'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256',
},
},
'ds:Reference': {
'@': { URI: "#xpointer(//*[@authenticate='true'])" },
'ds:Transforms': {
'ds:Transform': {
'@': {
Algorithm:
'http://www.w3.org/TR/2001/REC-xml-c14n-20010315',
},
},
},
'ds:DigestMethod': {
'@': {
Algorithm:
'http://www.w3.org/2001/04/xmlenc#sha256',
},
},
'ds:DigestValue': {},
},
},
'ds:SignatureValue': {},
});
const body = {};
const xmlOptions = {
declaration: {
include: true,
encoding: 'utf-8',
},
format: {
doubleQuotes: true,
indent: '',
newline: '',
pretty: true,
},
};
module.exports = (hostId, transactionId) => ({
// return {
productString: constants.productString,
rootName,
xmlOptions,
xmlSchema: {
'@': rootAttributes,
header,
AuthSignature: authSignature,
body,
},
receipt() {
this.xmlSchema = {
'@': rootAttributes,
header: {
'@': { authenticate: true },
static: {
HostID: hostId,
TransactionID: transactionId,
},
mutable: {
TransactionPhase: 'Receipt',
},
},
AuthSignature: authSignature,
body: {
TransferReceipt: {
'@': { authenticate: true },
ReceiptCode: 0,
},
},
};
return this;
},
transfer(encryptedOrderData) {
this.xmlSchema = {
'@': rootAttributes,
header: {
'@': { authenticate: true },
static: {
HostID: hostId,
TransactionID: transactionId,
},
mutable: {
TransactionPhase: 'Transfer',
SegmentNumber: {
'@': { lastSegment: true },
'#': 1,
},
},
},
AuthSignature: authSignature,
body: {
DataTransfer: {
OrderData: encryptedOrderData,
},
},
};
return this;
},
// };
});

View File

@@ -0,0 +1,148 @@
'use strict';
const zlib = require('zlib');
const js2xmlparser = require('js2xmlparser');
const Crypto = require('../../../crypto/Crypto');
const genericSerializer = require('./generic');
const keySignature = (ebicsAccount, key, xmlOptions) => {
const xmlOrderData = {
'@': {
'xmlns:ds': 'http://www.w3.org/2000/09/xmldsig#',
xmlns: 'http://www.ebics.org/S001',
},
SignaturePubKeyInfo: {
PubKeyValue: {
'ds:RSAKeyValue': {
'ds:Modulus': key.n().toString('base64'),
'ds:Exponent': key.e().toString('base64'),
},
TimeStamp: Crypto.timestamp(),
},
SignatureVersion: 'A006',
},
PartnerID: ebicsAccount.partnerId,
UserID: ebicsAccount.userId,
};
return js2xmlparser.parse('SignaturePubKeyOrderData', xmlOrderData, xmlOptions);
};
const orderData = (ebicsAccount, keys, xmlOptions) => {
const xmlOrderData = {
'@': {
'xmlns:ds': 'http://www.w3.org/2000/09/xmldsig#',
xmlns: 'urn:org:ebics:H004',
},
AuthenticationPubKeyInfo: {
PubKeyValue: {
'ds:RSAKeyValue': {
'ds:Modulus': keys.x().n().toString('base64'),
'ds:Exponent': keys.x().e().toString('base64'),
},
},
AuthenticationVersion: 'X002',
},
EncryptionPubKeyInfo: {
PubKeyValue: {
'ds:RSAKeyValue': {
'ds:Modulus': keys.e().n().toString('base64'),
'ds:Exponent': keys.e().e().toString('base64'),
},
},
EncryptionVersion: 'E002',
},
PartnerID: ebicsAccount.partnerId,
UserID: ebicsAccount.userId,
};
return js2xmlparser.parse('HIARequestOrderData', xmlOrderData, xmlOptions);
};
const commonHeader = (ebicsAccount, orderDetails, productString) => ({
'@': { authenticate: true },
static: {
HostID: ebicsAccount.hostId,
Nonce: Crypto.nonce(),
Timestamp: Crypto.timestamp(),
PartnerID: ebicsAccount.partnerId,
UserID: ebicsAccount.userId,
Product: {
'@': { Language: 'en' },
'#': productString,
},
OrderDetails: orderDetails,
SecurityMedium: '0000',
},
mutable: {},
});
const process = {
INI: {
rootName: 'ebicsUnsecuredRequest',
header: (ebicsAccount, orderDetails, productString) => {
const ch = commonHeader(ebicsAccount, orderDetails, productString);
delete ch.static.Nonce;
delete ch.static.Timestamp;
return ch;
},
body: (ebicsAccount, keys, xmlOptions) => ({
DataTransfer: {
OrderData: Buffer.from(zlib.deflateSync(keySignature(ebicsAccount, keys.a(), xmlOptions))).toString('base64'),
},
}),
},
HIA: {
rootName: 'ebicsUnsecuredRequest',
header: (ebicsAccount, orderDetails, productString) => {
const ch = commonHeader(ebicsAccount, orderDetails, productString);
delete ch.static.Nonce;
delete ch.static.Timestamp;
return ch;
},
body: (ebicsAccount, keys, xmlOptions) => ({
DataTransfer: {
OrderData: Buffer.from(zlib.deflateSync(orderData(ebicsAccount, keys, xmlOptions))).toString('base64'),
},
}),
},
HPB: {
rootName: 'ebicsNoPubKeyDigestsRequest',
header: (ebicsAccount, orderDetails, productString) => commonHeader(ebicsAccount, orderDetails, productString),
body: () => ({}),
},
};
module.exports = {
async use(order, client) {
const keys = await client.keys();
const { orderDetails, transactionId } = order;
const { xmlOptions, xmlSchema, productString } = genericSerializer(client.host, transactionId);
const orderType = orderDetails.OrderType.toUpperCase();
const ebicsAccount = {
partnerId: client.partnerId,
userId: client.userId,
hostId: client.hostId,
};
this.rootName = process[orderType].rootName;
this.xmlOptions = xmlOptions;
this.xmlSchema = xmlSchema;
this.xmlSchema.header = process[orderType].header(ebicsAccount, orderDetails, productString);
this.xmlSchema.body = process[orderType].body(ebicsAccount, keys, this.xmlOptions);
if (orderType !== 'HPB' && Object.prototype.hasOwnProperty.call(this.xmlSchema, 'AuthSignature'))
delete this.xmlSchema.AuthSignature;
return this;
},
toXML() {
return js2xmlparser.parse(this.rootName, this.xmlSchema, this.xmlOptions);
},
};

View File

@@ -0,0 +1,93 @@
'use strict';
const zlib = require('zlib');
const crypto = require('crypto');
const js2xmlparser = require('js2xmlparser');
const Crypto = require('../../../crypto/Crypto');
const downloadSerializer = require('./download');
const transKey = crypto.randomBytes(16);
const signatureValue = (document, key) => {
const digested = Crypto.digestWithHash(document.replace(/\n|\r/g, ''));
return Crypto.sign(key, digested);
};
const orderSignature = (ebicsAccount, document, key, xmlOptions) => {
const xmlObj = {
'@': {
xmlns: 'http://www.ebics.org/S001',
'xmlns:xsi': 'http://www.w3.org/2001/XMLSchema-instance',
'xsi:schemaLocation': 'http://www.ebics.org/S001 http://www.ebics.org/S001/ebics_signature.xsd',
},
OrderSignatureData: {
SignatureVersion: 'A006',
SignatureValue: signatureValue(document, key),
PartnerID: ebicsAccount.partnerId,
UserID: ebicsAccount.userId,
},
};
return js2xmlparser.parse('UserSignatureData', xmlObj, xmlOptions);
};
const encryptedOrderSignature = (ebicsAccount, document, transactionKey, key, xmlOptions) => {
const dst = zlib.deflateSync(orderSignature(ebicsAccount, document, key, xmlOptions));
const cipher = crypto.createCipheriv('aes-128-cbc', transactionKey, Buffer.from([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])).setAutoPadding(false);
return Buffer.concat([cipher.update(Crypto.pad(dst)), cipher.final()]).toString('base64');
};
const encryptedOrderData = (document, transactionKey) => {
const dst = zlib.deflateSync(document.replace(/\n|\r/g, ''));
const cipher = crypto.createCipheriv('aes-128-cbc', transactionKey, Buffer.from([0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0])).setAutoPadding(false);
return Buffer.concat([cipher.update(Crypto.pad(dst)), cipher.final()]).toString('base64');
};
module.exports = {
async use(order, client) {
const keys = await client.keys();
const ebicsAccount = {
partnerId: client.partnerId,
userId: client.userId,
hostId: client.hostId,
};
const { transactionId, document } = order;
const {
rootName, xmlOptions, xmlSchema, transfer,
} = await downloadSerializer.use(order, client);
this.rootName = rootName;
this.xmlOptions = xmlOptions;
this.xmlSchema = xmlSchema;
this.transfer = transfer;
if (transactionId) return this.transfer(encryptedOrderData(document, transKey));
this.xmlSchema.header.static.NumSegments = 1;
this.xmlSchema.body = {
DataTransfer: {
DataEncryptionInfo: {
'@': { authenticate: true },
EncryptionPubKeyDigest: {
'@': { Version: 'E002', Algorithm: 'http://www.w3.org/2001/04/xmlenc#sha256' },
'#': Crypto.digestPublicKey(keys.bankE()),
},
TransactionKey: Crypto.publicEncrypt(keys.bankE(), transKey).toString('base64'),
},
SignatureData: {
'@': { authenticate: true },
'#': encryptedOrderSignature(ebicsAccount, document, transKey, keys.a(), this.xmlOptions),
},
},
};
return this;
},
toXML() {
return js2xmlparser.parse(this.rootName, this.xmlSchema, this.xmlOptions);
},
};

49
lib/orders/H004/signer.js Normal file
View File

@@ -0,0 +1,49 @@
'use strict';
// const crypto = require('crypto');
const Crypto = require('../../crypto/Crypto');
const { DOMParser, XMLSerializer } = require('xmldom');
const xpath = require('xpath');
const C14n = require('xml-crypto/lib/c14n-canonicalization').C14nCanonicalization;
const digest = (doc) => {
// get the xml node, where the digested value is supposed to be
const nodeDigestValue = doc.getElementsByTagName('ds:DigestValue')[0];
// canonicalize the node that has authenticate='true' attribute
const contentToDigest = xpath.select("//*[@authenticate='true']", doc)
.map(x => new C14n().process(x)).join('');
// fix the canonicalization
const fixedContent = contentToDigest.replace(/xmlns="urn:org:ebics:H004"/g, 'xmlns="urn:org:ebics:H004" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"');
if (nodeDigestValue)
nodeDigestValue.textContent = Crypto.digestWithHash(fixedContent).toString('base64').trim();
return doc;
};
const sign = (doc, key) => {
const nodeSignatureValue = doc.getElementsByTagName('ds:SignatureValue')[0];
if (nodeSignatureValue) {
const select = xpath.useNamespaces({ ds: 'http://www.w3.org/2000/09/xmldsig#' });
const contentToSign = (new C14n().process(select('//ds:SignedInfo', doc)[0])).replace('xmlns:ds="http://www.w3.org/2000/09/xmldsig#"', 'xmlns="urn:org:ebics:H004" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"');
nodeSignatureValue.textContent = Crypto.privateSign(key, contentToSign); // this.keys.x().key.sign(contentToSign, 'base64');
}
return doc;
};
const toXML = doc => new XMLSerializer().serializeToString(doc);
module.exports = {
sign(data, keyX) {
const doc = new DOMParser().parseFromString(data, 'text/xml');
return toXML(sign(digest(doc), keyX));
},
};

View File

@@ -1,43 +0,0 @@
'use strict';
const GenericOrder = require('./GenericOrder');
module.exports = class HAA extends GenericOrder {
constructor (client) {
super(client);
this._schema.header = {
"@": { authenticate: true },
static: {
HostID: this.hostId,
Nonce: this.nonce(),
Timestamp: this.timestamp(),
PartnerID: this.partnerId,
UserID: this.userId,
Product: {
"@": { Language: "de" },
"#": this.productString
},
OrderDetails: {
OrderType: "HAA",
OrderAttribute: "DZHNN",
StandardOrderParams: ""
},
BankPubKeyDigests: {
Authentication: {
"@": { Version: "X002", Algorithm: "http://www.w3.org/2001/04/xmlenc#sha256" },
"#": this.client.bankX().publicDigest()
},
Encryption: {
"@": { Version: "E002", Algorithm: "http://www.w3.org/2001/04/xmlenc#sha256" },
"#": this.client.bankE().publicDigest()
}
},
SecurityMedium: "0000"
},
mutable: {
TransactionPhase: "Initialisation"
}
};
};
};

View File

@@ -1,54 +0,0 @@
'use strict';
const GenericOrder = require('./GenericOrder');
module.exports = class HAC extends GenericOrder {
constructor (client, from = null, to = null) {
super(client);
this._from = from;
this._to = to;
this._schema.header = {
"@" : { authenticate: true },
static: {
HostID : this.hostId,
Nonce : this.nonce(),
Timestamp: this.timestamp(),
PartnerID: this.partnerId,
UserID : this.userId,
Product : {
"@": { Language: "de" },
"#": this.productString,
},
OrderDetails: {
OrderType : "HAC",
OrderAttribute : "DZHNN",
StandardOrderParams: this._hasDateRange() ? {
DateRange: {
Start: this._from,
End : this._to
}
} : ""
},
BankPubKeyDigests: {
Authentication: {
"@": { Version: "X002", Algorithm: "http://www.w3.org/2001/04/xmlenc#sha256" },
"#": this.client.bankX().publicDigest()
},
Encryption: {
"@": { Version: "E002", Algorithm: "http://www.w3.org/2001/04/xmlenc#sha256" },
"#": this.client.bankE().publicDigest()
}
},
SecurityMedium: "0000"
},
mutable: {
TransactionPhase: "Initialisation"
}
};
};
_hasDateRange() {
return this._from && this._to;
}
};

View File

@@ -1,85 +0,0 @@
'use strict';
const zlib = require('zlib');
const js2xmlparser = require('js2xmlparser');
const GenericOrder = require('./GenericOrder');
module.exports = class HIA extends GenericOrder {
constructor(client) {
super(client);
this._schema = {
"@": {
"xmlns:ds": "http://www.w3.org/2000/09/xmldsig#",
xmlns: "urn:org:ebics:H004",
Version: "H004",
Revision: "1"
},
header: {
"@": { authenticate: true },
static: {
HostID: this.hostId,
PartnerID: this.partnerId,
UserID: this.userId,
Product: {
"@": { Language: "de" },
"#": this.productString,
},
OrderDetails: {
OrderType: "HIA",
OrderAttribute: "DZNNN"
},
SecurityMedium: "0000"
},
mutable: {}
},
body: {
DataTransfer: {
OrderData: Buffer.from(zlib.deflateSync(this.orderData())).toString('base64')
}
}
};
}
root() {
return "ebicsUnsecuredRequest";
};
orderData() {
const xmlOrderData = {
"@": {
"xmlns:ds": "http://www.w3.org/2000/09/xmldsig#",
xmlns: "urn:org:ebics:H004"
},
AuthenticationPubKeyInfo: {
PubKeyValue: {
"ds:RSAKeyValue": {
"ds:Modulus": Buffer.from(this.client.x().n(), 'HEX').toString('base64'),
"ds:Exponent": "AQAB"
},
},
AuthenticationVersion: "X002"
},
EncryptionPubKeyInfo: {
PubKeyValue: {
"ds:RSAKeyValue": {
"ds:Modulus": Buffer.from(this.client.e().n(), 'HEX').toString('base64'),
"ds:Exponent": "AQAB"
},
},
EncryptionVersion: "E002"
},
PartnerID: this.partnerId,
UserID: this.userId
};
return js2xmlparser.parse("HIARequestOrderData", xmlOrderData, this.xmlOptions);
};
toXML() {
return js2xmlparser.parse(this.root(), this._schema, this.xmlOptions);
};
};

View File

@@ -1,43 +0,0 @@
'use strict';
const GenericOrder = require('./GenericOrder');
module.exports = class HKD extends GenericOrder {
constructor (client) {
super(client);
this._schema.header = {
"@": { authenticate: true },
static: {
HostID: this.hostId,
Nonce: this.nonce(),
Timestamp: this.timestamp(),
PartnerID: this.partnerId,
UserID: this.userId,
Product: {
"@": { Language: "de" },
"#": this.productString,
},
OrderDetails: {
OrderType: "HKD",
OrderAttribute: "DZHNN",
StandardOrderParams: ""
},
BankPubKeyDigests: {
Authentication: {
"@": { Version: "X002", Algorithm: "http://www.w3.org/2001/04/xmlenc#sha256" },
"#": this.client.bankX().publicDigest()
},
Encryption: {
"@": { Version: "E002", Algorithm: "http://www.w3.org/2001/04/xmlenc#sha256" },
"#": this.client.bankE().publicDigest()
}
},
SecurityMedium: "0000"
},
mutable: {
TransactionPhase: "Initialisation"
}
};
};
};

View File

@@ -1,34 +0,0 @@
'use strict';
const GenericOrder = require('./GenericOrder');
module.exports = class HPB extends GenericOrder {
constructor (client) {
super(client);
this._schema.header = {
"@": { authenticate: true },
static: {
HostID: this.hostId,
Nonce: this.nonce(),
Timestamp: this.timestamp(),
PartnerID: this.partnerId,
UserID: this.userId,
Product: {
"@": { Language: "de" },
"#": this.productString,
},
OrderDetails: {
OrderType: "HPB",
OrderAttribute: "DZHNN"
},
SecurityMedium: "0000"
},
mutable: {}
};
};
root() {
return "ebicsNoPubKeyDigestsRequest";
};
};

View File

@@ -1,43 +0,0 @@
'use strict';
const GenericOrder = require('./GenericOrder');
module.exports = class HTD extends GenericOrder {
constructor (client) {
super(client);
this._schema.header = {
"@": { authenticate: true },
static: {
HostID: this.hostId,
Nonce: this.nonce(),
Timestamp: this.timestamp(),
PartnerID: this.partnerId,
UserID: this.userId,
Product: {
"@": { Language: "de" },
"#": this.productString,
},
OrderDetails: {
OrderType: "HTD",
OrderAttribute: "DZHNN",
StandardOrderParams: ""
},
BankPubKeyDigests: {
Authentication: {
"@": { Version: "X002", Algorithm: "http://www.w3.org/2001/04/xmlenc#sha256" },
"#": this.client.bankX().publicDigest()
},
Encryption: {
"@": { Version: "E002", Algorithm: "http://www.w3.org/2001/04/xmlenc#sha256" },
"#": this.client.bankE().publicDigest()
}
},
SecurityMedium: "0000"
},
mutable: {
TransactionPhase: "Initialisation"
}
};
};
};

View File

@@ -1,77 +0,0 @@
'use strict';
const zlib = require('zlib');
const js2xmlparser = require('js2xmlparser');
const GenericOrder = require('./GenericOrder');
module.exports = class INI extends GenericOrder {
constructor (client) {
super(client);
this._schema = {
"@": {
"xmlns:ds": "http://www.w3.org/2000/09/xmldsig#",
xmlns: "urn:org:ebics:H004",
Version: "H004",
Revision: "1"
},
header: {
"@": { authenticate: true },
static: {
HostID: this.hostId,
PartnerID: this.partnerId,
UserID: this.userId,
Product: {
"@": { Language: "de" },
"#": this.productString,
},
OrderDetails: {
OrderType: "INI",
OrderAttribute: "DZNNN"
},
SecurityMedium: "0000"
},
mutable: {}
},
body: {
DataTransfer: {
OrderData: Buffer.from(zlib.deflateSync(this.keySignature())).toString('base64')
}
}
};
}
root() {
return "ebicsUnsecuredRequest";
};
keySignature() {
const xmlOrderData = {
"@": {
"xmlns:ds": "http://www.w3.org/2000/09/xmldsig#",
xmlns: "http://www.ebics.org/S001"
},
SignaturePubKeyInfo: {
PubKeyValue: {
"ds:RSAKeyValue": {
"ds:Modulus": Buffer.from(this.client.a().n(), 'HEX').toString('base64'),
"ds:Exponent": "AQAB"
},
TimeStamp: this.timestamp()
},
SignatureVersion: "A006"
},
PartnerID: this.partnerId,
UserID: this.userId
};
return js2xmlparser.parse("SignaturePubKeyOrderData", xmlOrderData, this.xmlOptions);
};
toXML() {
return js2xmlparser.parse(this.root(), this._schema, this.xmlOptions);
}
};

View File

@@ -0,0 +1,8 @@
'use strict';
module.exports = document => ({
version: 'h004',
orderDetails: { OrderType: 'AZV', OrderAttribute: 'OZHNN', StandardOrderParams: {} },
operation: 'upload',
document,
});

View File

@@ -0,0 +1,8 @@
'use strict';
module.exports = document => ({
version: 'h004',
orderDetails: { OrderType: 'CCS', OrderAttribute: 'OZHNN', StandardOrderParams: {} },
operation: 'upload',
document,
});

View File

@@ -0,0 +1,8 @@
'use strict';
module.exports = document => ({
version: 'h004',
orderDetails: { OrderType: 'CCT', OrderAttribute: 'OZHNN', StandardOrderParams: {} },
operation: 'upload',
document,
});

View File

@@ -0,0 +1,8 @@
'use strict';
module.exports = document => ({
version: 'h004',
orderDetails: { OrderType: 'CD1', OrderAttribute: 'OZHNN', StandardOrderParams: {} },
operation: 'upload',
document,
});

View File

@@ -0,0 +1,8 @@
'use strict';
module.exports = document => ({
version: 'h004',
orderDetails: { OrderType: 'CDB', OrderAttribute: 'OZHNN', StandardOrderParams: {} },
operation: 'upload',
document,
});

View File

@@ -0,0 +1,8 @@
'use strict';
module.exports = document => ({
version: 'h004',
orderDetails: { OrderType: 'CDD', OrderAttribute: 'OZHNN', StandardOrderParams: {} },
operation: 'upload',
document,
});

View File

@@ -0,0 +1,8 @@
'use strict';
module.exports = document => ({
version: 'h004',
orderDetails: { OrderType: 'CDS', OrderAttribute: 'OZHNN', StandardOrderParams: {} },
operation: 'upload',
document,
});

View File

@@ -0,0 +1,11 @@
'use strict';
module.exports = {
version: 'h004',
orderDetails: {
OrderType: 'HAA',
OrderAttribute: 'DZHNN',
StandardOrderParams: {},
},
operation: 'download',
};

View File

@@ -0,0 +1,13 @@
'use strict';
const utils = require('../utils');
module.exports = (start = null, end = null) => ({
version: 'h004',
orderDetails: {
OrderType: 'HAC',
OrderAttribute: 'DZHNN',
StandardOrderParams: utils.dateRange(start, end),
},
operation: 'download',
});

View File

@@ -0,0 +1,7 @@
'use strict';
module.exports = {
version: 'h004',
orderDetails: { OrderType: 'HIA', OrderAttribute: 'DZNNN' },
operation: 'ini',
};

View File

@@ -0,0 +1,11 @@
'use strict';
module.exports = {
version: 'h004',
orderDetails: {
OrderType: 'HKD',
OrderAttribute: 'DZHNN',
StandardOrderParams: {},
},
operation: 'download',
};

View File

@@ -0,0 +1,7 @@
'use strict';
module.exports = {
version: 'h004',
orderDetails: { OrderType: 'HPB', OrderAttribute: 'DZHNN' },
operation: 'ini',
};

View File

@@ -0,0 +1,11 @@
'use strict';
module.exports = {
version: 'h004',
orderDetails: {
OrderType: 'HPD',
OrderAttribute: 'DZHNN',
StandardOrderParams: {},
},
operation: 'download',
};

View File

@@ -0,0 +1,11 @@
'use strict';
module.exports = {
version: 'h004',
orderDetails: {
OrderType: 'HTD',
OrderAttribute: 'DZHNN',
StandardOrderParams: {},
},
operation: 'download',
};

View File

@@ -0,0 +1,7 @@
'use strict';
module.exports = {
version: 'h004',
orderDetails: { OrderType: 'INI', OrderAttribute: 'DZNNN' },
operation: 'ini',
};

View File

@@ -0,0 +1,13 @@
'use strict';
const utils = require('../utils');
module.exports = (start = null, end = null) => ({
version: 'h004',
orderDetails: {
OrderType: 'PTK',
OrderAttribute: 'DZHNN',
StandardOrderParams: utils.dateRange(start, end),
},
operation: 'download',
});

View File

@@ -0,0 +1,13 @@
'use strict';
const utils = require('../utils');
module.exports = (start = null, end = null) => ({
version: 'h004',
orderDetails: {
OrderType: 'STA',
OrderAttribute: 'DZHNN',
StandardOrderParams: utils.dateRange(start, end),
},
operation: 'download',
});

View File

@@ -0,0 +1,13 @@
'use strict';
const utils = require('../utils');
module.exports = (start = null, end = null) => ({
version: 'h004',
orderDetails: {
OrderType: 'VMK',
OrderAttribute: 'DZHNN',
StandardOrderParams: utils.dateRange(start, end),
},
operation: 'download',
});

View File

@@ -0,0 +1,8 @@
'use strict';
module.exports = document => ({
version: 'h004',
orderDetails: { OrderType: 'XCT', OrderAttribute: 'OZHNN', StandardOrderParams: {} },
operation: 'upload',
document,
});

View File

@@ -0,0 +1,8 @@
'use strict';
module.exports = document => ({
version: 'h004',
orderDetails: { OrderType: 'XE3', OrderAttribute: 'OZHNN', StandardOrderParams: {} },
operation: 'upload',
document,
});

View File

@@ -0,0 +1,13 @@
'use strict';
const utils = require('../utils');
module.exports = (start = null, end = null) => ({
version: 'h004',
orderDetails: {
OrderType: 'Z53',
OrderAttribute: 'DZHNN',
StandardOrderParams: utils.dateRange(start, end),
},
operation: 'download',
});

View File

@@ -0,0 +1,50 @@
'use strict';
const INI = require('./INI');
const HIA = require('./HIA');
const HPB = require('./HPB');
const AZV = require('./AZV');
const CD1 = require('./CD1');
const CDB = require('./CDB');
const CDD = require('./CDD');
const CDS = require('./CDS');
const CCT = require('./CCT');
const CCS = require('./CCS');
const XE3 = require('./XE3');
const XCT = require('./XCT');
const STA = require('./STA');
const VMK = require('./VMK');
const HAA = require('./HAA');
const HTD = require('./HTD');
const HPD = require('./HPD');
const HKD = require('./HKD');
const PTK = require('./PTK');
const HAC = require('./HAC');
const Z53 = require('./Z53');
module.exports = {
INI,
HIA,
HPB,
Z53,
AZV,
CD1,
CDB,
CDD,
CDS,
CCT,
CCS,
XE3,
XCT,
STA,
VMK,
HAA,
HTD,
HPD,
HKD,
PTK,
HAC,
};

View File

@@ -0,0 +1,29 @@
'use strict';
const fs = require('fs');
module.exports = (pathToFile) => {
const path = pathToFile;
return {
write(data) {
return new Promise((resolve, reject) => {
fs.writeFile(path, data, { encoding: 'utf8' }, (error) => {
if (error) reject(error);
return resolve();
});
});
},
read() {
return new Promise((resolve, reject) => {
fs.readFile(path, { encoding: 'utf8' }, (error, data) => {
if (error) reject(error);
return resolve(data);
});
});
},
};
};

View File

@@ -0,0 +1,63 @@
'use strict';
const fs = require('fs');
const uuidv1 = require('uuid/v1');
const traceName = (uuid, label, type, ext = 'xml') => `${uuid}_${label}_${type}.${ext}`;
module.exports = dir => ({
traceData: '',
traceLabel: '',
lastTraceID: null,
connectToLastTrace: false,
label(str) {
this.traceLabel = str;
return this;
},
data(data) {
if (!data)
throw Error('No trace given to be persisted.');
this.traceData = data;
return this;
},
ofType(type) {
this.type = type;
return this;
},
new() {
this.connectToLastTrace = false;
return this;
},
connect() {
this.connectToLastTrace = true;
return this;
},
persist() {
if (!dir)
throw Error('No directory to save the traces to provided.');
this.lastTraceID = this.connectToLastTrace ? this.lastTraceID : uuidv1();
const name = traceName(this.lastTraceID, this.traceLabel, this.type);
const path = `${dir}/${name}`;
try {
fs.writeFileSync(path, this.traceData);
} catch (error) {
throw error;
}
},
});

46
lib/utils.js Normal file
View File

@@ -0,0 +1,46 @@
'use strict';
const prefixNumber = (n) => {
if (n < 10)
return `0${n}`;
return n.toString();
};
const date = {
getDateObject(d = Date.now()) {
const dateObject = new Date(d);
// eslint-disable-next-line no-restricted-globals
if (isNaN(dateObject))
throw new Error(`${d} is invalid date.`);
return dateObject;
},
toISODate(d = Date.now(), utc = true) {
const t = date.getDateObject(d);
if (utc)
return `${t.getUTCFullYear()}-${prefixNumber(t.getUTCMonth() + 1)}-${prefixNumber(t.getUTCDate())}`;
return `${t.getFullYear()}-${prefixNumber(t.getMonth() + 1)}-${prefixNumber(t.getDate())}`;
},
toISOTime(d = Date.now(), utc = true) {
const t = date.getDateObject(d);
if (utc)
return `${prefixNumber(t.getUTCHours())}:${prefixNumber(t.getUTCMinutes())}:${prefixNumber(t.getUTCSeconds())}`;
return `${prefixNumber(t.getHours())}:${prefixNumber(t.getMinutes())}:${prefixNumber(t.getSeconds())}`;
},
};
const dateRange = (start, end) => {
if (start && end)
return {
DateRange: {
Start: date.toISODate(start),
End: date.toISODate(end),
},
};
return {};
};
module.exports = {
dateRange,
date,
};

View File

@@ -1,36 +1,51 @@
{
"name": "node-ebics-client",
"version": "0.0.35",
"description": "Node.js ISO 20022 Compliant EBICS Client",
"main": "index.js",
"scripts": {
"test": "echo \"Error: no test specified\" && exit 1"
},
"repository": {
"type": "git",
"url": "https://github.com/eCollect/node-ebics-client"
},
"keywords": [
"EBICS",
"ISO20022",
"nodejs",
"api"
],
"author": "eCollect Sofia Tech Team",
"license": "MIT",
"dependencies": {
"bn.js": "^4.11.8",
"handlebars": "^4.0.11",
"js2xmlparser": "^3.0.0",
"moment": "^2.22.1",
"node-rsa": "^0.4.2",
"xml-c14n": "0.0.6",
"xmldom": "^0.1.27",
"xpath": "0.0.27"
},
"devDependencies": {
"eslint": "^4.19.1",
"eslint-config-airbnb-base": "^12.1.0",
"eslint-plugin-import": "^2.12.0"
"name": "ebics-client",
"version": "0.1.1",
"description": "Node.js ISO 20022 Compliant EBICS Client",
"main": "index.js",
"scripts": {
"lint": "eslint .",
"test": "mocha test/**/*.js"
},
"repository": {
"type": "git",
"url": "https://github.com/eCollect/node-ebics-client"
},
"keywords": [
"EBICS",
"ISO20022",
"nodejs",
"api"
],
"author": "eCollect Sofia Tech Team",
"contributors": [
{
"name": "Vasyl Stashuk",
"url": "https://github.com/vasyas"
},
{
"name": "Yago",
"url": "https://github.com/yagop"
}
],
"license": "GPLv3",
"dependencies": {
"bn.js": "^5.0.0",
"handlebars": "^4.4.3",
"js2xmlparser": "^4.0.0",
"node-forge": "^0.9.1",
"request": "^2.88.0",
"uuid": "^3.3.3",
"xml-crypto": "^1.4.0",
"xmldom": "^0.1.27",
"xpath": "0.0.27"
},
"devDependencies": {
"chai": "^4.2.0",
"eslint": "^6.6.0",
"eslint-config-ecollect-base": "^0.1.2",
"eslint-plugin-import": "^2.18.2",
"libxmljs": "^0.19.7",
"mocha": "^6.2.2"
}
}

43
test/fixtures/keys.js vendored Normal file
View File

@@ -0,0 +1,43 @@
'use strict';
const publicSmallExpPEM = '';
const publicSmallExpMod = '';
const publicSmallExpExp = '';
const publicBigPEM = `-----BEGIN PUBLIC KEY-----
MIIBJDANBgkqhkiG9w0BAQEFAAOCAREAMIIBDAKCAQEAuvqhJ2ptulHGUmYq3BOO
NoIDXOUDrVV3s188wvU3Fj9TcO3yBqWuJ5GMEzRIOfi8Pb4AkJBjjPOR0Taby7+n
7coa2Zm0ZprGzXVM1Gb0aG3BAbDaFbvdF25NLAtkmtKKW/8YfXy89qvy6+UEBdOa
1UTLaR+9Pf63Wa+qu638udSDe3refHdZV1bKUR1UOZ/1iWn5b7aq4vITRPNNWXk5
eG8He2lWzYHg5+yY4ckBooh1K5cMwl5s+Iz24iWtqIlV5EyORbdfGatrNzv6S7Lx
FngEGCL5e97qU1pAcarE9XmrlJ5dHl9LQPaw957AlZuOFpVEE5shXZkSgRYrHv2m
cQIFAQAAAA8=
-----END PUBLIC KEY-----`;
const publicBigModString = 'ALr6oSdqbbpRxlJmKtwTjjaCA1zlA61Vd7NfPML1NxY/U3Dt8galrieRjBM0SDn4vD2+AJCQY4zzkdE2m8u/p+3KGtmZtGaaxs11TNRm9GhtwQGw2hW73RduTSwLZJrSilv/GH18vPar8uvlBAXTmtVEy2kfvT3+t1mvqrut/LnUg3t63nx3WVdWylEdVDmf9Ylp+W+2quLyE0TzTVl5OXhvB3tpVs2B4OfsmOHJAaKIdSuXDMJebPiM9uIlraiJVeRMjkW3Xxmrazc7+kuy8RZ4BBgi+Xve6lNaQHGqxPV5q5SeXR5fS0D2sPeewJWbjhaVRBObIV2ZEoEWKx79pnE=';
const publicBigModBytes = [0, 186, 250, 161, 39, 106, 109, 186, 81, 198, 82, 102, 42, 220, 19, 142, 54, 130, 3, 92, 229, 3, 173, 85, 119, 179, 95, 60, 194, 245, 55, 22, 63, 83, 112, 237, 242, 6, 165, 174, 39, 145, 140, 19, 52, 72, 57, 248, 188, 61, 190, 0, 144, 144, 99, 140, 243, 145, 209, 54, 155, 203, 191, 167, 237, 202, 26, 217, 153, 180, 102, 154, 198, 205, 117, 76, 212, 102, 244, 104, 109, 193, 1, 176, 218, 21, 187, 221, 23, 110, 77, 44, 11, 100, 154, 210, 138, 91, 255, 24, 125, 124, 188, 246, 171, 242, 235, 229, 4, 5, 211, 154, 213, 68, 203, 105, 31, 189, 61, 254, 183, 89, 175, 170, 187, 173, 252, 185, 212, 131, 123, 122, 222, 124, 119, 89, 87, 86, 202, 81, 29, 84, 57, 159, 245, 137, 105, 249, 111, 182, 170, 226, 242, 19, 68, 243, 77, 89, 121, 57, 120, 111, 7, 123, 105, 86, 205, 129, 224, 231, 236, 152, 225, 201, 1, 162, 136, 117, 43, 151, 12, 194, 94, 108, 248, 140, 246, 226, 37, 173, 168, 137, 85, 228, 76, 142, 69, 183, 95, 25, 171, 107, 55, 59, 250, 75, 178, 241, 22, 120, 4, 24, 34, 249, 123, 222, 234, 83, 90, 64, 113, 170, 196, 245, 121, 171, 148, 158, 93, 30, 95, 75, 64, 246, 176, 247, 158, 192, 149, 155, 142, 22, 149, 68, 19, 155, 33, 93, 153, 18, 129, 22, 43, 30, 253, 166, 113];
const publicBigExpString = 'AQAAAA8=';
const publicBigExpBytes = [1, 0, 0, 0, 15];
const pblc = {
big: {
pem: publicBigPEM,
mod: {
bytes: publicBigModBytes,
string: publicBigModString,
},
exp: {
bytes: publicBigExpBytes,
string: publicBigExpString,
},
},
small: {
pem: publicSmallExpPEM,
mod: publicSmallExpMod,
exp: publicSmallExpExp,
},
};
module.exports = {
pblc,
};

105
test/spec/H004.js Normal file
View File

@@ -0,0 +1,105 @@
'use strict';
/* eslint-env node, mocha */
const { assert } = require('chai');
const path = require('path');
const fs = require('fs');
const ebics = require('../../');
const libxml = require('libxmljs');
const schemaPath = path.resolve(__dirname, '../xsd/ebics_H004.xsd');
const schemaDoc = libxml.parseXml(fs.readFileSync(schemaPath, { encoding: 'utf8' }));
const schemaDir = path.dirname(schemaPath);
const cwd = process.cwd();
const validateXML = (str) => {
try {
process.chdir(schemaDir);
const isValid = libxml.parseXmlString(str).validate(schemaDoc);
process.chdir(cwd);
return isValid;
} catch (e) {
process.chdir(cwd);
return false;
}
};
const client = new ebics.Client({
url: 'https://iso20022test.credit-suisse.com/ebicsweb/ebicsweb',
partnerId: 'CRS04381',
userId: 'CRS04381',
hostId: 'CRSISOTB',
passphrase: 'test',
keyStorage: ebics.fsKeysStorage(path.resolve(__dirname, '../support/TEST_KEYS.key')),
});
const { Orders } = ebics;
/*
upload :
const AZV = require('./AZV');
const CD1 = require('./CD1');
const CDB = require('./CDB');
const CDD = require('./CDD');
const CDS = require('./CDS');
const CCT = require('./CCT');
const CCS = require('./CCS');
const XE3 = require('./XE3');
const XCT = require('./XCT');
*/
const uploadBuilder = fn => fn('');
const dateBuilder = fn => fn('2018-01-01', '2019-01-01');
const fnOrders = {
// upload | document
AZV: uploadBuilder,
CD1: uploadBuilder,
CDB: uploadBuilder,
CDD: uploadBuilder,
CDS: uploadBuilder,
CCT: uploadBuilder,
CCS: uploadBuilder,
XE3: uploadBuilder,
XCT: uploadBuilder,
// download
STA: dateBuilder,
VMK: dateBuilder,
HAA: dateBuilder,
HTD: dateBuilder,
HPD: dateBuilder,
HKD: dateBuilder,
PTK: dateBuilder,
HAC: dateBuilder,
Z53: dateBuilder,
};
const getOrderObject = (name, order) => {
if (typeof order === 'object')
return order;
if (fnOrders[name])
return fnOrders[name](order);
return null;
};
describe('H004 order generation', () => {
// eslint-disable-next-line no-restricted-syntax
for (const [name, orderDefinition] of Object.entries(Orders)) {
const order = getOrderObject(name, orderDefinition);
if (!order)
continue;
const type = order.orderDetails.OrderType;
const { operation } = order;
it(`[${operation}] ${type} order generation`, async () => {
const signedOrder = await client.signOrder(order);
assert.isTrue(validateXML(signedOrder));
});
}
});

File diff suppressed because one or more lines are too long

92
test/unit/keys.js Normal file
View File

@@ -0,0 +1,92 @@
'use strict';
/* eslint-env node, mocha */
const { assert } = require('chai');
const fixtures = require('../fixtures/keys');
// const Key = require('../lib/keymanagers/keyRSA');
const Key = require('../../lib/keymanagers/Key');
const stripWhitespace = str => str.replace(/\s+/g, '');
describe('Keys management', () => {
describe('generates brand new', () => {
const keySize = 2048;
// const newKey = Key().generate(keySize);
const newKey = Key.generate();
it('private key', () => {
assert.isTrue(newKey.isPrivate());
});
it('that has the right key size', () => {
// const newKeySize = newKey.size(); // console.log(newKey.size());
assert(newKey.size(), keySize);
});
});
describe('creates public key from mod and exp', () => {
const { pem, mod, exp } = fixtures.pblc.big;
describe('that are strings', () => {
const m = Buffer.from(mod.string, 'base64');
const e = Buffer.from(exp.string, 'base64');
/* const newKey = Key().importKey({
mod: m, exp: e, modulus: mod.string, exponent: exp.string,
}); */
const newKey = new Key({ mod: m, exp: e });
it('and is really public', () => {
assert.isTrue(newKey.isPublic());
});
it('and has a propper mod in bytes', () => {
assert.deepEqual([...newKey.n()], mod.bytes);
});
it('and has a propper pem string', () => {
assert.equal(stripWhitespace(newKey.toPem()), stripWhitespace(pem));
});
});
describe('that are bytes', () => {
const m = Buffer.from(mod.bytes);
const e = Buffer.from(exp.bytes);
/* const newKey = Key().importKey({
mod: m, exp: e, modulus: mod.string, exponent: exp.string,
}); */
const newKey = new Key({ mod: m, exp: e });
it('and is really public', () => {
assert.isTrue(newKey.isPublic());
});
it('and has a propper mod as a string', () => {
assert.equal(newKey.n().toString('base64'), mod.string);
});
it('and has a propper pem string', () => {
assert.equal(stripWhitespace(newKey.toPem()), stripWhitespace(pem));
});
});
});
describe('creates public key from pem string', () => {
const { pem } = fixtures.pblc.big;
// const newKey = Key(pem);
const newKey = new Key({ pem });
it('and is really public', () => {
assert.isTrue(newKey.isPublic());
});
it('and has a propper(the same) pem string', () => {
/* newKey.pempem = {
modulus: mod.string,
exponent: exp.string,
}; */
assert.equal(stripWhitespace(newKey.toPem()), stripWhitespace(pem));
});
});
});

View File

@@ -0,0 +1,45 @@
'use strict';
/* eslint-env node, mocha */
const { assert } = require('chai');
const H004Response = require('../../lib/orders/H004/response');
describe('H004 response parsing', () => {
it('parses bank keys', () => {
const response = H004Response('<xml/>', {});
const x002mod = 'ntbX6WFjAJP5RyH4ogDG/26wZGzEJXsTudyvcgXmUdk1AExCNqArXDiSlGXpVNq4BKddUMFUmVOyvkdNckPRV2mk3uHNCE5T3tFKQI3FlwHSJHvPSpb9gtHnsK03jByMigWjhTKvsjIdfLVay5m5Bctxq9+5JMHwlNk7MlVXBQcqaFiHFFS1lPfA3Wk1bptPeeGyYcP0+U798oQWnCABKwS8hmYcp5xBtozGoRj9L/NDE68pdP8o/wTKNwT4Jo5nQKYfDsgO4R+z9vVv37Htp6bWhK8Jw3tpkcd3JnkYWx+Ylg0XBpg8LfjFhY2Jc7FqLlx0Bn0Y3PRLI1apxgC85w==';
const e002mod = '4eOGrzcJHVzbEgZTmyPYUIq9kFoua8Ure1Mvyq6XlawFgCWskfu/xSKNLIMJ7H675wl/5y0Oy16P/b6pJEhWrzOw8omW46PBDTaXw9BDYBTuBblluz1yUnzpgfblP8gkRmxAo+QMIskmwdSzuZMiJcLNSzu/bkmLHK2RdrVYMAZLlB6QXTykdenPZtNmc2z4VU6TRmGljAwg2VUNF6iQoucbzDUuca+yUo3fiXZp69nfXv81X2ND+p1ir6zQpx7tbOdfauw0sEKI/Z/lC+E4fMrMlh/ZvOxSYUMA55J4liC3aUV3mTR3dPJHWu1aD1a7EfJnNw0eHLwlB+36qfgGuw==';
response.orderData = () => `<?xml version="1.0" encoding="UTF-8"?>
<HPBResponseOrderData xmlns="urn:org:ebics:H004" xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<AuthenticationPubKeyInfo>
<PubKeyValue>
<ds:RSAKeyValue>
<ds:Modulus>${x002mod}</ds:Modulus>
<ds:Exponent>AQAB</ds:Exponent>
</ds:RSAKeyValue>
<TimeStamp>2015-02-25T08:01:13.061Z</TimeStamp>
</PubKeyValue>
<AuthenticationVersion>X002</AuthenticationVersion>
</AuthenticationPubKeyInfo>
<EncryptionPubKeyInfo>
<PubKeyValue>
<ds:RSAKeyValue>
<ds:Modulus>${e002mod}</ds:Modulus>
<ds:Exponent>AQAB</ds:Exponent>
</ds:RSAKeyValue>
<TimeStamp>2015-02-25T08:01:12.344Z</TimeStamp>
</PubKeyValue>
<EncryptionVersion>E002</EncryptionVersion>
</EncryptionPubKeyInfo>
<HostID>SBKPR01</HostID>
</HPBResponseOrderData>`;
const bankKeys = response.bankKeys();
assert.equal(bankKeys.bankX002.mod.toString('base64'), x002mod);
assert.equal(bankKeys.bankE002.mod.toString('base64'), e002mod);
});
});

29
test/unit/utils.js Normal file
View File

@@ -0,0 +1,29 @@
'use strict';
/* eslint-env node, mocha */
const { assert } = require('chai');
const utils = require('../../lib/utils');
describe('utils', () => {
describe('dateRange', () => {
describe('dateRange', () => {
it('should generate empty object with partial parameters', () => {
assert.isEmpty(utils.dateRange());
});
it('should throw with invalid date', () => {
assert.throws(() => utils.dateRange('2018-15-15', '2018-20-20'));
});
it('should work for valid string input', () => {
assert.containsAllDeepKeys(utils.dateRange('2018-01-15', '2018-01-20'), { DateRange: { Start: '2018-01-15', End: '2018-01-20' } });
});
it('should work for Date string input', () => {
assert.containsAllDeepKeys(utils.dateRange(new Date('2018-01-15'), new Date('2018-01-20')), { DateRange: { Start: '2018-01-15', End: '2018-01-20' } });
});
it('should work for timestamp string input', () => {
assert.containsAllDeepKeys(utils.dateRange(new Date('2018-01-15').getTime(), new Date('2018-01-20').getTime()), { DateRange: { Start: '2018-01-15', End: '2018-01-20' } });
});
});
});
});

11
test/xsd/ebics_H004.xsd Executable file
View File

@@ -0,0 +1,11 @@
<?xml version="1.0" encoding="UTF-8"?>
<schema xmlns="http://www.w3.org/2001/XMLSchema" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:ebics="urn:org:ebics:H004" targetNamespace="urn:org:ebics:H004" elementFormDefault="qualified" attributeFormDefault="unqualified" version="1.0">
<annotation>
<documentation xml:lang="de">ebics_H004.xsd inkludiert alle Schemadateien des EBICS-Protokolls, um die Eindeutigkeit von Element- und Typnamen im EBCIS Namespace zu erzwingen.</documentation>
<documentation xml:lang="en">ebics_H004.xsd includes all schema files for the EBICS protocol in order to enforce unique element and type names in the EBICS namespace.</documentation>
</annotation>
<include schemaLocation="ebics_request_H004.xsd"/>
<include schemaLocation="ebics_response_H004.xsd"/>
<include schemaLocation="ebics_keymgmt_request_H004.xsd"/>
<include schemaLocation="ebics_keymgmt_response_H004.xsd"/>
</schema>

135
test/xsd/ebics_hev.xsd Executable file
View File

@@ -0,0 +1,135 @@
<?xml version="1.0" encoding="UTF-8"?>
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:ebics="http://www.ebics.org/H000" targetNamespace="http://www.ebics.org/H000" elementFormDefault="qualified" attributeFormDefault="unqualified" version="1.0">
<xs:annotation>
<xs:documentation xml:lang="de">ebics_hev.xsd ist das EBICS-Protokollschema entweder für Anfragen oder Rückmeldungen der Bank zu unterstützten EBICS-Versionen.</xs:documentation>
<xs:documentation xml:lang="en">ebics_hev.xsd is the appropriate EBICS protocol schema either for requests or responses according the EBICS versions supported by a bank.</xs:documentation>
</xs:annotation>
<xs:simpleType name="HostIDType">
<xs:annotation>
<xs:documentation xml:lang="de">Datentyp für die Host-ID.</xs:documentation>
<xs:documentation xml:lang="en">Dataype for Host-ID.</xs:documentation>
</xs:annotation>
<xs:restriction base="xs:token">
<xs:maxLength value="35"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType name="OrderTBaseType">
<xs:annotation>
<xs:documentation xml:lang="de">Datentyp für allgemeine Auftragsarten (Grundtyp).</xs:documentation>
<xs:documentation xml:lang="en">Datatype for general order types (basic type).</xs:documentation>
</xs:annotation>
<xs:restriction base="xs:token">
<xs:length value="3"/>
<xs:pattern value="HEV"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType name="ReturnCodeType">
<xs:annotation>
<xs:documentation xml:lang="de">Datentyp für Antwortcodes.</xs:documentation>
<xs:documentation xml:lang="en">Datatype for the return code</xs:documentation>
</xs:annotation>
<xs:restriction base="xs:token">
<xs:length value="6"/>
<xs:pattern value="\d{6}"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType name="ReportTextType">
<xs:annotation>
<xs:documentation xml:lang="de">Datentyp für den Erklärungstext zum Antwortcode.</xs:documentation>
<xs:documentation xml:lang="en">Datatype for report text with respect to the return code</xs:documentation>
</xs:annotation>
<xs:restriction base="xs:normalizedString">
<xs:maxLength value="256"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType name="VersionNumberType">
<xs:annotation>
<xs:documentation xml:lang="de">Datentyp für eine Versionsnummer</xs:documentation>
<xs:documentation xml:lang="en">Datatype for a release number </xs:documentation>
</xs:annotation>
<xs:restriction base="xs:token">
<xs:length value="5"/>
<xs:pattern value="[0-9]{2}[.][0-9]{2}"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType name="ProtocolVersionType">
<xs:annotation>
<xs:documentation xml:lang="de">Datentyp für Versionsnummer des EBICS-schemas</xs:documentation>
<xs:documentation xml:lang="en">Datatype for release-number of the EBICS scheme</xs:documentation>
</xs:annotation>
<xs:restriction base="xs:token">
<xs:length value="4"/>
<xs:pattern value="H\d{3}"/>
</xs:restriction>
</xs:simpleType>
<xs:complexType name="SystemReturnCodeType">
<xs:annotation>
<xs:documentation xml:lang="de">Datentyp für technische Fehler.</xs:documentation>
<xs:documentation xml:lang="en">Datatype for technical error</xs:documentation>
</xs:annotation>
<xs:sequence>
<xs:element name="ReturnCode" type="ebics:ReturnCodeType">
<xs:annotation>
<xs:documentation xml:lang="de">Rückmeldung des Ausführungsstatus mit einer eindeutigen Fehlernummer.</xs:documentation>
<xs:documentation xml:lang="en">Confirmation of the carried out status with a unique error code.</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element name="ReportText" type="ebics:ReportTextType">
<xs:annotation>
<xs:documentation xml:lang="de">Klartext der Rückmeldung des Ausführungsstatus.</xs:documentation>
<xs:documentation xml:lang="en">Clear text of the response (carried out status).</xs:documentation>
</xs:annotation>
</xs:element>
</xs:sequence>
</xs:complexType>
<xs:complexType name="HEVRequestDataType">
<xs:annotation>
<xs:documentation xml:lang="de">Datentyp für die Request-Daten</xs:documentation>
<xs:documentation xml:lang="en">Data type for Request data</xs:documentation>
</xs:annotation>
<xs:sequence>
<xs:element name="HostID" type="ebics:HostIDType"/>
<xs:any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="HEVResponseDataType">
<xs:annotation>
<xs:documentation xml:lang="en">Datentyp für die Response-Daten</xs:documentation>
<xs:documentation xml:lang="en">Data type for Request data</xs:documentation>
</xs:annotation>
<xs:sequence>
<xs:element name="SystemReturnCode" type="ebics:SystemReturnCodeType"/>
<xs:element name="VersionNumber" minOccurs="0" maxOccurs="unbounded">
<xs:annotation>
<xs:documentation xml:lang="de">Von der Bank unterstützte EBICS-Versionen, z.B. 2.4</xs:documentation>
<xs:documentation xml:lang="en">EBICS-releases supported by the bank, e.g. 2.4</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:simpleContent>
<xs:extension base="ebics:VersionNumberType">
<xs:attribute name="ProtocolVersion" type="ebics:ProtocolVersionType" use="required">
<xs:annotation>
<xs:documentation xml:lang="de">der EBICS-Version eindeutig zugeordnete Schema-Version, z.B. H003</xs:documentation>
<xs:documentation xml:lang="en">EBICS-scheme-version, e.g. H003, well-defined for EBICS-release-Version</xs:documentation>
</xs:annotation>
</xs:attribute>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
</xs:element>
<xs:any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:element name="ebicsHEVRequest" type="ebics:HEVRequestDataType">
<xs:annotation>
<xs:documentation xml:lang="de">Requestdaten</xs:documentation>
<xs:documentation xml:lang="en">request data</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element name="ebicsHEVResponse" type="ebics:HEVResponseDataType">
<xs:annotation>
<xs:documentation xml:lang="de">Responsedaten</xs:documentation>
<xs:documentation xml:lang="en">response data</xs:documentation>
</xs:annotation>
</xs:element>
</xs:schema>

View File

@@ -0,0 +1,543 @@
<?xml version="1.0" encoding="UTF-8"?>
<!-- Mit XMLSpy v2008 rel. 2 sp2 (http://www.altova.com) von benutzerservice benutzerservice (SIZ GmbH) bearbeitet -->
<schema xmlns="http://www.w3.org/2001/XMLSchema" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:ebics="urn:org:ebics:H004" targetNamespace="urn:org:ebics:H004" elementFormDefault="qualified" attributeFormDefault="unqualified" version="1.0">
<annotation>
<documentation xml:lang="de">ebics_keymgmt_request_H004.xsd ist das EBICS-Protokollschema für Schlüsselmanagement-Anfragen (HIA, HPB, HSA, INI).</documentation>
</annotation>
<import namespace="http://www.w3.org/2000/09/xmldsig#" schemaLocation="xmldsig-core-schema.xsd">
<annotation>
<documentation xml:lang="de">XML-Signature.</documentation>
</annotation>
</import>
<include schemaLocation="ebics_types_H004.xsd"/>
<include schemaLocation="ebics_orders_H004.xsd"/>
<complexType name="StaticHeaderBaseType" abstract="true">
<annotation>
<documentation xml:lang="de">Datentyp für den statischen EBICS-Header (allgemein).</documentation>
</annotation>
<sequence>
<element name="HostID" type="ebics:HostIDType">
<annotation>
<documentation xml:lang="de">Hostname des Banksystems.</documentation>
</annotation>
</element>
<element name="Nonce" type="ebics:NonceType" minOccurs="0">
<annotation>
<documentation xml:lang="de">Zufallswert; damit wird die Initialisierungsnachricht des Clients einzigartig; nur anzugeben, falls Authentifikationssignatur vorhanden.</documentation>
</annotation>
</element>
<element name="Timestamp" type="ebics:TimestampType" minOccurs="0">
<annotation>
<documentation xml:lang="de">aktueller Zeitstempel zur Begrenzung der serverseitigen Nonce-Speicherung; nur anzugeben, falls Authentifikationssignatur vorhanden.</documentation>
</annotation>
</element>
<element name="PartnerID" type="ebics:PartnerIDType">
<annotation>
<documentation xml:lang="de">Kunden-ID des serverseitig administrierten Kunden.</documentation>
</annotation>
</element>
<element name="UserID" type="ebics:UserIDType">
<annotation>
<documentation xml:lang="de">Teilnehmer-ID des serverseitig zu diesem Kunden administrierten Teilnehmers.</documentation>
</annotation>
</element>
<element name="SystemID" type="ebics:UserIDType" minOccurs="0">
<annotation>
<documentation xml:lang="de">technische User-ID für Multi-User-Systeme.</documentation>
</annotation>
</element>
<element name="Product" type="ebics:ProductElementType" nillable="true" minOccurs="0">
<annotation>
<documentation xml:lang="de">Kennung des Kundenprodukts bzw. Herstellerkennung oder Name.</documentation>
</annotation>
</element>
<element name="OrderDetails" type="ebics:OrderDetailsType">
<annotation>
<documentation xml:lang="de">Auftragsdetails.</documentation>
</annotation>
</element>
<element name="SecurityMedium" type="ebics:SecurityMediumType">
<annotation>
<documentation xml:lang="de">Angabe des Sicherheitsmediums, das der Kunde verwendet.</documentation>
</annotation>
</element>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</complexType>
<complexType name="OrderDetailsType" abstract="true">
<annotation>
<documentation xml:lang="de">Datentyp für OrderDetails im statischen EBICS-Header (allgemein).</documentation>
</annotation>
<sequence>
<element name="OrderType" type="ebics:OrderTBaseType">
<annotation>
<documentation xml:lang="de">Auftragsart.</documentation>
</annotation>
</element>
<element name="OrderAttribute" type="ebics:OrderAttributeBaseType">
<annotation>
<documentation xml:lang="de">Auftragsattribut.</documentation>
</annotation>
</element>
</sequence>
</complexType>
<complexType name="ProductElementType">
<annotation>
<documentation xml:lang="de">Datentyp für Element mit Kennung des Kundenprodukts bzw. Herstellerkennung oder Name.</documentation>
</annotation>
<simpleContent>
<extension base="ebics:ProductType">
<attribute name="Language" type="ebics:LanguageType" use="required">
<annotation>
<documentation xml:lang="de">Sprachkennzeichen der Kundenproduktversion (gemäß ISO 639).</documentation>
</annotation>
</attribute>
<attribute name="InstituteID" type="ebics:InstituteIDType" use="optional">
<annotation>
<documentation xml:lang="de">Kennung des Herausgebers des Kundenprodukts bzw. des betreuenden Kreditinstituts.</documentation>
</annotation>
</attribute>
</extension>
</simpleContent>
</complexType>
<complexType name="EmptyMutableHeaderType">
<annotation>
<documentation xml:lang="de">Datentyp für den leeren variablen EBICS-Header von Key Managemen Aufträgen.</documentation>
</annotation>
<sequence>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</complexType>
<element name="ebicsUnsecuredRequest">
<annotation>
<documentation>Anfragestruktur für ungesicherte Auftragsarten HIA (Authentifikations- und Verschlüsselungsschlüssel senden) und INI (bankfachllichen Schlüssel senden).</documentation>
</annotation>
<complexType>
<sequence>
<element name="header">
<annotation>
<documentation xml:lang="de">enthält die technischen Transaktionsdaten.</documentation>
</annotation>
<complexType>
<sequence>
<element name="static" type="ebics:UnsecuredRequestStaticHeaderType">
<annotation>
<documentation xml:lang="de">enhält alle festen Headereinträge.</documentation>
</annotation>
</element>
<element name="mutable" type="ebics:EmptyMutableHeaderType">
<annotation>
<documentation xml:lang="de">enthält alle variablen Headereinträge.</documentation>
</annotation>
</element>
</sequence>
<attributeGroup ref="ebics:AuthenticationMarker"/>
</complexType>
</element>
<element name="body">
<annotation>
<documentation xml:lang="de">enthält die Auftragsdaten.</documentation>
</annotation>
<complexType>
<sequence>
<annotation>
<documentation xml:lang="de"/>
</annotation>
<element name="DataTransfer">
<annotation>
<documentation xml:lang="de">Transfer von Auftragsdaten.</documentation>
</annotation>
<complexType>
<sequence>
<element name="OrderData">
<annotation>
<documentation xml:lang="de">enthält Auftragsdaten.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:OrderDataType">
<anyAttribute namespace="##targetNamespace" processContents="lax"/>
</extension>
</simpleContent>
</complexType>
</element>
</sequence>
</complexType>
</element>
</sequence>
</complexType>
</element>
</sequence>
<attributeGroup ref="ebics:VersionAttrGroup"/>
</complexType>
</element>
<complexType name="UnsecuredRequestStaticHeaderType">
<annotation>
<documentation xml:lang="de">Datentyp für den statischen EBICS-Header bei ungesicherten Sendeauftragsarten (Aufträge HIA und INI): kein Nonce, kein Timestamp, keine EU-Datei, keine X001 Authentifizierung, keine Verschlüsselung, keine Digests der öffentlichen Bankschlüssel, Nutzdaten komprimiert, Auftragsattribut DZNNN</documentation>
</annotation>
<complexContent>
<restriction base="ebics:StaticHeaderBaseType">
<sequence>
<element name="HostID" type="ebics:HostIDType">
<annotation>
<documentation xml:lang="de">Hostname des Banksystems.</documentation>
</annotation>
</element>
<element name="Nonce" type="ebics:NonceType" minOccurs="0" maxOccurs="0">
<annotation>
<documentation xml:lang="de">Zufallswert; damit wird die Initialisierungsnachricht des Clients einzigartig; nicht anzugeben für ebicsUnsecuredRequest.</documentation>
</annotation>
</element>
<element name="Timestamp" type="ebics:TimestampType" minOccurs="0" maxOccurs="0">
<annotation>
<documentation xml:lang="de">aktueller Zeitstempel zur Begrenzung der serverseitigen Nonce-Speicherung; nicht anzugeben für ebicsUnsecuredRequest.</documentation>
</annotation>
</element>
<element name="PartnerID" type="ebics:PartnerIDType">
<annotation>
<documentation xml:lang="de">Kunden-ID des serverseitig administrierten Kunden.</documentation>
</annotation>
</element>
<element name="UserID" type="ebics:UserIDType">
<annotation>
<documentation xml:lang="de">Teilnehmer-ID des serverseitig zu diesem Kunden administrierten Teilnehmers.</documentation>
</annotation>
</element>
<element name="SystemID" type="ebics:UserIDType" minOccurs="0">
<annotation>
<documentation xml:lang="de">technische User-ID für Multi-User-Systeme.</documentation>
</annotation>
</element>
<element name="Product" type="ebics:ProductElementType" nillable="true" minOccurs="0">
<annotation>
<documentation xml:lang="de">Kennung des Kundenprodukts bzw. Herstellerkennung oder Name.</documentation>
</annotation>
</element>
<element name="OrderDetails" type="ebics:UnsecuredReqOrderDetailsType">
<annotation>
<documentation xml:lang="de">Auftragsdetails.</documentation>
</annotation>
</element>
<element name="SecurityMedium" type="ebics:SecurityMediumType">
<annotation>
<documentation xml:lang="de">Angabe des Sicherheitsmediums, das der Kunde verwendet.</documentation>
</annotation>
</element>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</restriction>
</complexContent>
</complexType>
<complexType name="UnsecuredReqOrderDetailsType">
<annotation>
<documentation xml:lang="de">Datentyp für OrderDetails im statischen EBICS-Header von ebicsUnsecuredRequest.</documentation>
</annotation>
<complexContent>
<restriction base="ebics:OrderDetailsType">
<sequence>
<element name="OrderType" type="ebics:OrderTBaseType">
<annotation>
<documentation xml:lang="de">Auftragsart.</documentation>
</annotation>
</element>
<element name="OrderAttribute" type="ebics:OrderAttributeBaseType" fixed="DZNNN">
<annotation>
<documentation xml:lang="de">Auftragsattribut: DZNNN.</documentation>
</annotation>
</element>
</sequence>
</restriction>
</complexContent>
</complexType>
<element name="ebicsNoPubKeyDigestsRequest">
<annotation>
<documentation>Anfragestruktur für Auftragsarten ohne Übertragung der Digests der öffentlichen Bankschlüssel (HPB Bankschlüssel abholen).</documentation>
</annotation>
<complexType>
<sequence>
<element name="header">
<annotation>
<documentation xml:lang="de">enthält die technischen Transaktionsdaten.</documentation>
</annotation>
<complexType>
<sequence>
<element name="static" type="ebics:NoPubKeyDigestsRequestStaticHeaderType">
<annotation>
<documentation xml:lang="de">enhält alle festen Headereinträge.</documentation>
</annotation>
</element>
<element name="mutable" type="ebics:EmptyMutableHeaderType">
<annotation>
<documentation xml:lang="de">enthält alle variablen Headereinträge.</documentation>
</annotation>
</element>
</sequence>
<attributeGroup ref="ebics:AuthenticationMarker"/>
</complexType>
</element>
<element ref="ebics:AuthSignature">
<annotation>
<documentation xml:lang="de">Authentifikationssignatur.</documentation>
</annotation>
</element>
<element name="body">
<annotation>
<documentation xml:lang="de">enthält optionale Zertifikate (vorgesehen).</documentation>
</annotation>
<complexType>
<sequence>
<annotation>
<documentation xml:lang="de"/>
</annotation>
<element ref="ds:X509Data" minOccurs="0" maxOccurs="0">
<annotation>
<documentation xml:lang="de">X.509-Daten des Teilnehmers.</documentation>
</annotation>
</element>
</sequence>
</complexType>
</element>
</sequence>
<attributeGroup ref="ebics:VersionAttrGroup"/>
</complexType>
</element>
<complexType name="NoPubKeyDigestsRequestStaticHeaderType">
<annotation>
<documentation xml:lang="de">Datentyp für den statischen EBICS-Header bei Aufträgen ohne Übertragung der Digests der Bankschlüssel (Auftrag HBP): keine Digests der öffentlichen Bankschlüssel, keine EU-Datei, keine Nutzdaten, OrderId optional!, Nonce, Timestamp, X001 Authentifizierung, Auftragsattribut DZHNN</documentation>
</annotation>
<complexContent>
<restriction base="ebics:StaticHeaderBaseType">
<sequence>
<element name="HostID" type="ebics:HostIDType">
<annotation>
<documentation xml:lang="de">Hostname des Banksystems.</documentation>
</annotation>
</element>
<element name="Nonce" type="ebics:NonceType">
<annotation>
<documentation xml:lang="de">Zufallswert; damit wird die Initialisierungsnachricht des Clients einzigartig.</documentation>
</annotation>
</element>
<element name="Timestamp" type="ebics:TimestampType">
<annotation>
<documentation xml:lang="de">aktueller Zeitstempel zur Begrenzung der serverseitigen Nonce-Speicherung.</documentation>
</annotation>
</element>
<element name="PartnerID" type="ebics:PartnerIDType">
<annotation>
<documentation xml:lang="de">Kunden-ID des serverseitig administrierten Kunden.</documentation>
</annotation>
</element>
<element name="UserID" type="ebics:UserIDType">
<annotation>
<documentation xml:lang="de">Teilnehmer-ID des serverseitig zu diesem Kunden administrierten Teilnehmers.</documentation>
</annotation>
</element>
<element name="SystemID" type="ebics:UserIDType" minOccurs="0">
<annotation>
<documentation xml:lang="de">technische User-ID für Multi-User-Systeme.</documentation>
</annotation>
</element>
<element name="Product" type="ebics:ProductElementType" nillable="true" minOccurs="0">
<annotation>
<documentation xml:lang="de">Kennung des Kundenprodukts bzw. Herstellerkennung oder Name.</documentation>
</annotation>
</element>
<element name="OrderDetails" type="ebics:NoPubKeyDigestsReqOrderDetailsType">
<annotation>
<documentation xml:lang="de">Auftragsdetails.</documentation>
</annotation>
</element>
<element name="SecurityMedium" type="ebics:SecurityMediumType">
<annotation>
<documentation xml:lang="de">Angabe des Sicherheitsmediums, das der Kunde verwendet.</documentation>
</annotation>
</element>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</restriction>
</complexContent>
</complexType>
<complexType name="NoPubKeyDigestsReqOrderDetailsType">
<annotation>
<documentation xml:lang="de">Datentyp für OrderDetails im statischen EBICS-Header von ebicsNoPubKeyDigestsRequest.</documentation>
</annotation>
<complexContent>
<restriction base="ebics:OrderDetailsType">
<sequence>
<element name="OrderType" type="ebics:OrderTBaseType">
<annotation>
<documentation xml:lang="de">Auftragsart.</documentation>
</annotation>
</element>
<element name="OrderAttribute" type="ebics:OrderAttributeBaseType" fixed="DZHNN">
<annotation>
<documentation xml:lang="de">Auftragsattribut: DZHNN.</documentation>
</annotation>
</element>
</sequence>
</restriction>
</complexContent>
</complexType>
<element name="ebicsUnsignedRequest">
<annotation>
<documentation xml:lang="en">The structure for uploads contains order data and the ESs, but without an authentication signature and data digest of bank keys.</documentation>
<documentation>Anfragestruktur für Sendeaufträge mit EU-Datei und Nutzdaten aber ohne Authentifizierungssignatur und Digests der Bankschlüssel.</documentation>
</annotation>
<complexType>
<sequence>
<element name="header">
<annotation>
<documentation xml:lang="en">Contains technical transaction data.</documentation>
<documentation xml:lang="de">enthält die technischen Transaktionsdaten.</documentation>
</annotation>
<complexType>
<sequence>
<element name="static" type="ebics:UnsignedRequestStaticHeaderType">
<annotation>
<documentation xml:lang="en">Contains all fixed header entries.</documentation>
<documentation xml:lang="de">enhält alle festen Headereinträge.</documentation>
</annotation>
</element>
<element name="mutable" type="ebics:EmptyMutableHeaderType">
<annotation>
<documentation xml:lang="en">Contains all mutable header entries.</documentation>
<documentation xml:lang="de">enthält alle variablen Headereinträge.</documentation>
</annotation>
</element>
</sequence>
<attributeGroup ref="ebics:AuthenticationMarker"/>
</complexType>
</element>
<element name="body">
<annotation>
<documentation xml:lang="en">Contains the order data and the ESs.</documentation>
<documentation xml:lang="de">enthält die Auftragsdaten und EUs.</documentation>
</annotation>
<complexType>
<sequence>
<annotation>
<documentation xml:lang="de"/>
</annotation>
<element name="DataTransfer">
<annotation>
<documentation xml:lang="en">Transfer of order data and the ESs.</documentation>
<documentation xml:lang="de">Transfer von Auftragsdaten und EUs.</documentation>
</annotation>
<complexType>
<sequence>
<element name="SignatureData">
<annotation>
<documentation xml:lang="en">Contains the ESs.</documentation>
<documentation xml:lang="de">enthält Signaturdaten (EUs).</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:SignatureDataType">
<attributeGroup ref="ebics:AuthenticationMarker"/>
</extension>
</simpleContent>
</complexType>
</element>
<element name="OrderData">
<annotation>
<documentation xml:lang="en">Contains the order data</documentation>
<documentation xml:lang="de">enthält Auftragsdaten.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:OrderDataType">
<anyAttribute namespace="##targetNamespace" processContents="lax"/>
</extension>
</simpleContent>
</complexType>
</element>
</sequence>
</complexType>
</element>
</sequence>
</complexType>
</element>
</sequence>
<attributeGroup ref="ebics:VersionAttrGroup"/>
</complexType>
</element>
<complexType name="UnsignedRequestStaticHeaderType">
<annotation>
<documentation xml:lang="de">Datentyp für den statischen EBICS-Header für ebicsUnsignedRequest.Datentyp für den statischen EBICS-Header bei Aufträgen ohne Authentifizierungssignatur (Auftrag HSA): keine X001 Authentifizierung, keine Digests der öffentlichen Bankschlüssel, EU-Datei, Nutzdaten, Nonce, Timestamp, OrderId, Auftragsattribut OZNNN</documentation>
</annotation>
<complexContent>
<restriction base="ebics:StaticHeaderBaseType">
<sequence>
<element name="HostID" type="ebics:HostIDType">
<annotation>
<documentation xml:lang="de">Hostname des Banksystems.</documentation>
</annotation>
</element>
<element name="Nonce" type="ebics:NonceType" minOccurs="0" maxOccurs="0">
<annotation>
<documentation xml:lang="de">Zufallswert; damit wird die Initialisierungsnachricht des Clients einzigartig; nicht anzugeben bei ebicsUnsignedRequest.</documentation>
</annotation>
</element>
<element name="Timestamp" type="ebics:TimestampType" minOccurs="0" maxOccurs="0">
<annotation>
<documentation xml:lang="de">aktueller Zeitstempel zur Begrenzung der serverseitigen Nonce-Speicherung; nicht anzugeben bei ebicsUnsignedRequest.</documentation>
</annotation>
</element>
<element name="PartnerID" type="ebics:PartnerIDType">
<annotation>
<documentation xml:lang="de">Kunden-ID des serverseitig administrierten Kunden.</documentation>
</annotation>
</element>
<element name="UserID" type="ebics:UserIDType">
<annotation>
<documentation xml:lang="de">Teilnehmer-ID des serverseitig zu diesem Kunden administrierten Teilnehmers.</documentation>
</annotation>
</element>
<element name="SystemID" type="ebics:UserIDType" minOccurs="0">
<annotation>
<documentation xml:lang="de">technische User-ID für Multi-User-Systeme.</documentation>
</annotation>
</element>
<element name="Product" type="ebics:ProductElementType" nillable="true" minOccurs="0">
<annotation>
<documentation xml:lang="de">Kennung des Kundenprodukts bzw. Herstellerkennung oder Name.</documentation>
</annotation>
</element>
<element name="OrderDetails" type="ebics:UnsignedReqOrderDetailsType">
<annotation>
<documentation xml:lang="de">Auftragsdetails.</documentation>
</annotation>
</element>
<element name="SecurityMedium" type="ebics:SecurityMediumType">
<annotation>
<documentation xml:lang="de">Angabe des Sicherheitsmediums, das der Kunde verwendet.</documentation>
</annotation>
</element>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</restriction>
</complexContent>
</complexType>
<complexType name="UnsignedReqOrderDetailsType">
<annotation>
<documentation xml:lang="de">Datentyp für OrderDetails im statischen EBICS-Header von ebicsUnsignedRequest.</documentation>
</annotation>
<complexContent>
<restriction base="ebics:OrderDetailsType">
<sequence>
<element name="OrderType" type="ebics:OrderTBaseType">
<annotation>
<documentation xml:lang="de">Auftragsart.</documentation>
</annotation>
</element>
<element name="OrderAttribute" type="ebics:OrderAttributeBaseType" fixed="OZNNN">
<annotation>
<documentation xml:lang="de">Auftragsattribut: OZNNN.</documentation>
</annotation>
</element>
</sequence>
</restriction>
</complexContent>
</complexType>
</schema>

View File

@@ -0,0 +1,137 @@
<?xml version="1.0" encoding="UTF-8"?>
<!-- Mit XMLSpy v2008 rel. 2 sp2 (http://www.altova.com) von benutzerservice benutzerservice (SIZ GmbH) bearbeitet -->
<schema xmlns="http://www.w3.org/2001/XMLSchema" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:ebics="urn:org:ebics:H004" targetNamespace="urn:org:ebics:H004" elementFormDefault="qualified" attributeFormDefault="unqualified" version="1.0">
<annotation>
<documentation xml:lang="de">ebics_keymgmt_response_H004.xsd ist das EBICS-Protokollschema für Schlüsselmanagement-Antwortnachrichten (HIA, HPB, HSA, INI).</documentation>
</annotation>
<import namespace="http://www.w3.org/2000/09/xmldsig#" schemaLocation="xmldsig-core-schema.xsd">
<annotation>
<documentation xml:lang="de">XML-Signature.</documentation>
</annotation>
</import>
<include schemaLocation="ebics_types_H004.xsd"/>
<include schemaLocation="ebics_orders_H004.xsd"/>
<element name="ebicsKeyManagementResponse">
<annotation>
<documentation xml:lang="de">Electronic Banking Internet Communication Standard des Zentralen Kreditausschusses (ZKA): Multibankfähige Schnittstelle zur internetbasierten Kommunikation.</documentation>
</annotation>
<complexType>
<sequence>
<element name="header">
<annotation>
<documentation xml:lang="de">enthält die technischen Transaktionsdaten.</documentation>
</annotation>
<complexType>
<sequence>
<element name="static">
<annotation>
<documentation xml:lang="de">enhält alle festen Headereinträge.</documentation>
</annotation>
<complexType>
<sequence/>
</complexType>
</element>
<element name="mutable" type="ebics:KeyMgmntResponseMutableHeaderType">
<annotation>
<documentation xml:lang="de">enthält alle variablen Headereinträge.</documentation>
</annotation>
</element>
</sequence>
<attributeGroup ref="ebics:AuthenticationMarker"/>
</complexType>
</element>
<element name="body">
<annotation>
<documentation xml:lang="de">enthält die Auftragsdaten und den fachlichen ReturnCode.</documentation>
</annotation>
<complexType>
<sequence>
<element name="DataTransfer" minOccurs="0">
<annotation>
<documentation xml:lang="de">Transfer von Auftragsdaten; nur bei Download anzugeben (HPB).</documentation>
</annotation>
<complexType>
<sequence>
<element name="DataEncryptionInfo">
<annotation>
<documentation xml:lang="de">Informationen zur Verschlüsselung der Auftragsdaten</documentation>
</annotation>
<complexType>
<complexContent>
<extension base="ebics:DataEncryptionInfoType">
<attributeGroup ref="ebics:AuthenticationMarker"/>
</extension>
</complexContent>
</complexType>
</element>
<element name="OrderData">
<annotation>
<documentation xml:lang="de">enthält Auftragsdaten.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:OrderDataType">
<anyAttribute namespace="##targetNamespace" processContents="lax"/>
</extension>
</simpleContent>
</complexType>
</element>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</complexType>
</element>
<element name="ReturnCode">
<annotation>
<documentation xml:lang="de">Antwortcode für den vorangegangenen Transfer.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:ReturnCodeType">
<attributeGroup ref="ebics:AuthenticationMarker"/>
</extension>
</simpleContent>
</complexType>
</element>
<element name="TimestampBankParameter" minOccurs="0">
<annotation>
<documentation xml:lang="de">Zeitstempel der letzten Aktualisierung der Bankparameter; nur in der Initialisierungsphase anzugeben.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:TimestampType">
<attributeGroup ref="ebics:AuthenticationMarker"/>
</extension>
</simpleContent>
</complexType>
</element>
</sequence>
</complexType>
</element>
</sequence>
<attributeGroup ref="ebics:VersionAttrGroup"/>
</complexType>
</element>
<complexType name="KeyMgmntResponseMutableHeaderType">
<annotation>
<documentation xml:lang="de">Datentyp für den variablen EBICS-Header.</documentation>
</annotation>
<sequence>
<element name="OrderID" type="ebics:OrderIDType" minOccurs="0">
<annotation>
<documentation xml:lang="de">Auftragsnummer von Sendeaufträgen gemäß DFÜ-Abkommen (used for all key management order types except download order type HPB).</documentation>
</annotation>
</element>
<element name="ReturnCode" type="ebics:ReturnCodeType">
<annotation>
<documentation xml:lang="de">Rückmeldung des Ausführungsstatus mit einer eindeutigen Fehlernummer.</documentation>
</annotation>
</element>
<element name="ReportText" type="ebics:ReportTextType">
<annotation>
<documentation xml:lang="de">Klartext der Rückmeldung des Ausführungsstatus.</documentation>
</annotation>
</element>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</complexType>
</schema>

1892
test/xsd/ebics_orders_H004.xsd Executable file

File diff suppressed because it is too large Load Diff

355
test/xsd/ebics_request_H004.xsd Executable file
View File

@@ -0,0 +1,355 @@
<?xml version="1.0" encoding="UTF-8"?>
<!-- Mit XMLSpy v2008 rel. 2 (http://www.altova.com) von Sabine Wenzel (SIZ Bonn) bearbeitet -->
<schema xmlns="http://www.w3.org/2001/XMLSchema" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:ebics="urn:org:ebics:H004" targetNamespace="urn:org:ebics:H004" elementFormDefault="qualified" attributeFormDefault="unqualified" version="1.0">
<annotation>
<documentation xml:lang="de">ebics_request_H004.xsd ist das EBICS-Protokollschema für Anfragen.</documentation>
<documentation xml:lang="en">ebics_request_H004.xsd is the appropriate EBICS protocol schema for standard requests.</documentation>
</annotation>
<include schemaLocation="ebics_types_H004.xsd"/>
<include schemaLocation="ebics_orders_H004.xsd"/>
<import namespace="http://www.w3.org/2000/09/xmldsig#" schemaLocation="xmldsig-core-schema.xsd"/>
<element name="ebicsRequest">
<annotation>
<documentation xml:lang="de">Electronic Banking Internet Communication Standard of the EBICS SCRL: Multibankfähige Schnittstelle zur internetbasierten Kommunikation.</documentation>
<documentation xml:lang="en">Electronic Banking Internet Communication Standard der EBICS SCRL: multi-bank capable interface for internet-based communication.</documentation>
</annotation>
<complexType>
<sequence>
<element name="header">
<annotation>
<documentation xml:lang="de">enthält die technischen Transaktionsdaten.</documentation>
<documentation xml:lang="en">contains the transaction-driven data.</documentation>
</annotation>
<complexType>
<sequence>
<element name="static" type="ebics:StaticHeaderType">
<annotation>
<documentation xml:lang="de">enhält alle festen Headereinträge.</documentation>
<documentation xml:lang="en">contains the static header entries.</documentation>
</annotation>
</element>
<element name="mutable" type="ebics:MutableHeaderType">
<annotation>
<documentation xml:lang="de">enthält alle variablen Headereinträge.</documentation>
<documentation xml:lang="en">contains the mutable header entries.</documentation>
</annotation>
</element>
</sequence>
<attributeGroup ref="ebics:AuthenticationMarker"/>
</complexType>
</element>
<element ref="ebics:AuthSignature"/>
<element name="body">
<annotation>
<documentation xml:lang="de">enthält die Auftragsdaten, EU(s) und weitere Nutzdaten.</documentation>
<documentation xml:lang="en">contains order data, order signature(s) and further data referring to the current order.</documentation>
</annotation>
<complexType>
<sequence>
<annotation>
<documentation xml:lang="de"/>
</annotation>
<element ref="ds:X509Data" minOccurs="0" maxOccurs="0">
<annotation>
<documentation xml:lang="de">X.509-Daten des Teilnehmers.</documentation>
<documentation xml:lang="en">X.509 data of the user.</documentation>
</annotation>
</element>
<choice>
<annotation>
<documentation xml:lang="de">Welche Transaktionsphase?</documentation>
<documentation xml:lang="en">Which transaction phase?</documentation>
</annotation>
<sequence>
<annotation>
<documentation xml:lang="de">Initialisierungs- und Transferphase.</documentation>
<documentation xml:lang="en">Initialisation or transfer phase.</documentation>
</annotation>
<element name="PreValidation" minOccurs="0">
<annotation>
<documentation xml:lang="de">Daten zur Vorabprüfung; nur anzugeben in der Initialisierungsphase bei Uploads mit Auftragsattribut OZH (EUs + Auftragsdaten).</documentation>
<documentation xml:lang="en">Data sent for pre-validation; mandatory for initialisation phase during uploads using order attribute OZH (order signature(s) + order data).</documentation>
</annotation>
<complexType>
<complexContent>
<extension base="ebics:PreValidationRequestType">
<attributeGroup ref="ebics:AuthenticationMarker"/>
</extension>
</complexContent>
</complexType>
</element>
<element name="DataTransfer" type="ebics:DataTransferRequestType" minOccurs="0">
<annotation>
<documentation xml:lang="de">Transfer von Signatur- bzw. Auftragsdaten; nur bei Upload anzugeben.</documentation>
<documentation xml:lang="en">Transfer of signature or order data; mandatory for uploads only.</documentation>
</annotation>
</element>
</sequence>
<sequence>
<annotation>
<documentation xml:lang="de">Quittierungsphase nach Download.</documentation>
<documentation xml:lang="en">Receipt phase after download.</documentation>
</annotation>
<element name="TransferReceipt">
<annotation>
<documentation xml:lang="de">Quittierung des Transfers.</documentation>
<documentation xml:lang="en">Receipt of transfer.</documentation>
</annotation>
<complexType>
<complexContent>
<extension base="ebics:TransferReceiptRequestType">
<attributeGroup ref="ebics:AuthenticationMarker"/>
</extension>
</complexContent>
</complexType>
</element>
</sequence>
</choice>
</sequence>
</complexType>
</element>
</sequence>
<attributeGroup ref="ebics:VersionAttrGroup"/>
<anyAttribute namespace="##targetNamespace" processContents="strict"/>
</complexType>
</element>
<complexType name="StaticHeaderType">
<annotation>
<documentation xml:lang="de">Datentyp für den statischen EBICS-Header.</documentation>
<documentation xml:lang="en">Data type for the static EBICS header.</documentation>
</annotation>
<sequence>
<element name="HostID" type="ebics:HostIDType">
<annotation>
<documentation xml:lang="de">Hostname des Banksystems.</documentation>
</annotation>
</element>
<choice>
<annotation>
<documentation xml:lang="de">Transaktionsphase?</documentation>
<documentation xml:lang="en">Transaction phase?</documentation>
</annotation>
<sequence>
<annotation>
<documentation xml:lang="de">Initialisierungsphase.</documentation>
<documentation xml:lang="en">Initialisation phase.</documentation>
</annotation>
<element name="Nonce" type="ebics:NonceType">
<annotation>
<documentation xml:lang="de">Zufallswert; damit wird die Initialisierungsnachricht des Clients einzigartig.</documentation>
<documentation xml:lang="en">Random value, ensures the uniqueness of the client's message during initialisation phase.</documentation>
</annotation>
</element>
<element name="Timestamp" type="ebics:TimestampType">
<annotation>
<documentation xml:lang="de">aktueller Zeitstempel zur Begrenzung der serverseitigen Nonce-Speicherung.</documentation>
<documentation xml:lang="en">current timestamp, used to limit storage space for nonces on the server.</documentation>
</annotation>
</element>
<element name="PartnerID" type="ebics:PartnerIDType">
<annotation>
<documentation xml:lang="de">Kunden-ID des serverseitig administrierten Kunden.</documentation>
<documentation xml:lang="en">ID of the partner = customer, administered on the server.</documentation>
</annotation>
</element>
<element name="UserID" type="ebics:UserIDType">
<annotation>
<documentation xml:lang="de">Teilnehmer-ID des serverseitig zu diesem Kunden administrierten Teilnehmers.</documentation>
<documentation xml:lang="en">ID of the user that is assigned to the given customer, administered on the server.</documentation>
</annotation>
</element>
<element name="SystemID" type="ebics:UserIDType" minOccurs="0">
<annotation>
<documentation xml:lang="de">technische User-ID für Multi-User-Systeme.</documentation>
<documentation xml:lang="en">ID of the system for multi-user systems.</documentation>
</annotation>
</element>
<element name="Product" nillable="true" minOccurs="0">
<annotation>
<documentation xml:lang="de">Kennung des Kundenprodukts bzw. Herstellerkennung oder Name.</documentation>
<documentation xml:lang="en">software ID / manufacturer ID / manufacturer's name of the customer's software package.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:ProductType">
<attribute name="Language" type="ebics:LanguageType" use="required">
<annotation>
<documentation xml:lang="de">Sprachkennzeichen der Kundenproduktversion (gemäß ISO 639).</documentation>
<documentation xml:lang="en">Language code of the customer's software package according to ISO 639.</documentation>
</annotation>
</attribute>
<attribute name="InstituteID" type="ebics:InstituteIDType" use="optional">
<annotation>
<documentation xml:lang="de">Kennung des Herausgebers des Kundenprodukts bzw. des betreuenden Kreditinstituts.</documentation>
<documentation xml:lang="en">ID of the manufacturer / financial institute providing support for the customer's software package.</documentation>
</annotation>
</attribute>
</extension>
</simpleContent>
</complexType>
</element>
<element name="OrderDetails" type="ebics:StaticHeaderOrderDetailsType">
<annotation>
<documentation xml:lang="de">Auftragsdetails.</documentation>
<documentation xml:lang="en">order details.</documentation>
</annotation>
</element>
<element name="BankPubKeyDigests">
<annotation>
<documentation xml:lang="de">Hashwerte der erwarteten öffentlichen Schlüssel (Verschlüsselung, Signatur, Authentifikation) des Kreditinstituts.</documentation>
<documentation xml:lang="en">Digest values of the expected public keys (authentication, encryption, signature) owned by the financial institute.</documentation>
</annotation>
<complexType>
<sequence>
<element name="Authentication">
<annotation>
<documentation xml:lang="de">Hashwert des Authentifikationsschlüssels.</documentation>
<documentation xml:lang="en">Digest value of the public authentication key.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:PubKeyDigestType">
<attribute name="Version" type="ebics:AuthenticationVersionType" use="required">
<annotation>
<documentation xml:lang="de">Version des Authentifikationsverfahrens.</documentation>
<documentation xml:lang="en">Version of the algorithm used for authentication.</documentation>
</annotation>
</attribute>
</extension>
</simpleContent>
</complexType>
</element>
<element name="Encryption">
<annotation>
<documentation xml:lang="de">Hashwert des Verschlüsselungsschlüssels.</documentation>
<documentation xml:lang="en">Digest value of the public encryption key.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:PubKeyDigestType">
<attribute name="Version" type="ebics:EncryptionVersionType" use="required">
<annotation>
<documentation xml:lang="de">Version des Verschlüsselungsverfahrens.</documentation>
<documentation xml:lang="en">Version of the algorithm used for encryption.</documentation>
</annotation>
</attribute>
</extension>
</simpleContent>
</complexType>
</element>
<element name="Signature" minOccurs="0" maxOccurs="0">
<annotation>
<documentation xml:lang="de">Hashwert des Signaturschlüssels.</documentation>
<documentation xml:lang="en">Digest value of the public signature key.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:PubKeyDigestType">
<attribute name="Version" type="ebics:SignatureVersionType" use="required">
<annotation>
<documentation xml:lang="de">Version des Signaturverfahrens.</documentation>
<documentation xml:lang="en">Version of the algorithm used for signature creation.</documentation>
</annotation>
</attribute>
</extension>
</simpleContent>
</complexType>
</element>
</sequence>
</complexType>
</element>
<element name="SecurityMedium" type="ebics:SecurityMediumType">
<annotation>
<documentation xml:lang="de">Angabe des Sicherheitsmediums, das der Kunde verwendet.</documentation>
<documentation xml:lang="en">Classification of the security medium used by the customer.</documentation>
</annotation>
</element>
<element name="NumSegments" type="ebics:NumSegmentsType" minOccurs="0">
<annotation>
<documentation xml:lang="de">Gesamtsegmentanzahl für diese Transaktion; nur bei Uploads anzugeben.</documentation>
<documentation xml:lang="en">Total number of segments for this transaction; mandatory for uploads only.</documentation>
</annotation>
</element>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
<sequence>
<annotation>
<documentation xml:lang="de">Transfer- und Quittierungsphase.</documentation>
<documentation xml:lang="en">Transfer or receipt phase.</documentation>
</annotation>
<element name="TransactionID" type="ebics:TransactionIDType">
<annotation>
<documentation xml:lang="de">eindeutige, technische Transaktions-ID; wird vom Server vergeben.</documentation>
<documentation xml:lang="en">unique transaction ID, provided by the server.</documentation>
</annotation>
</element>
</sequence>
</choice>
</sequence>
</complexType>
<complexType name="MutableHeaderType">
<annotation>
<documentation xml:lang="de">Datentyp für den variablen EBICS-Header.</documentation>
<documentation xml:lang="en">Data type for the mutable EBICS header.</documentation>
</annotation>
<sequence>
<element name="TransactionPhase" type="ebics:TransactionPhaseType">
<annotation>
<documentation xml:lang="de">Phase, in der sich die Transaktion gerade befindet; wird bei jedem Transaktionsschritt vom Client gesetzt und vom Server übernommen.</documentation>
<documentation xml:lang="en">Current phase of the transaction; this information is provided by the client for each step of the transaction, and the server adopts the setting.</documentation>
</annotation>
</element>
<element name="SegmentNumber" nillable="true" minOccurs="0">
<annotation>
<documentation xml:lang="de">enthält die Nummer des aktuellen Segments, welches gerade übertragen oder angefordert wird; nur anzugeben bei TransactionPhase=Transfer.</documentation>
<documentation xml:lang="en">contains the number of the segment which is currently being transmitted or requested; mandatory for transaction phase 'Transfer' only.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:SegmentNumberType">
<attribute name="lastSegment" type="boolean" use="required">
<annotation>
<documentation xml:lang="de">Ist dies das letzte Segment der Übertragung?</documentation>
<documentation xml:lang="en">Is this segment meant to be the last one regarding this transmission?</documentation>
</annotation>
</attribute>
</extension>
</simpleContent>
</complexType>
</element>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</complexType>
<complexType name="StaticHeaderOrderDetailsType">
<annotation>
<documentation xml:lang="de">Datentyp für Auftragsdetails im statischen EBICS-Header.</documentation>
<documentation xml:lang="en">Data type for order details stored in the static EBICS header.</documentation>
</annotation>
<sequence>
<element name="OrderType">
<annotation>
<documentation xml:lang="de">Auftragsart.</documentation>
<documentation xml:lang="en">type code of the order.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:OrderTBaseType"/>
</simpleContent>
</complexType>
</element>
<element name="OrderID" type="ebics:OrderIDType" minOccurs="0">
<annotation>
<documentation xml:lang="de">Auftragsnummer für Sendeaufträge gemäß DFÜ-Abkommen.</documentation>
<documentation xml:lang="en">ID of the (upload) order, formatted in accordance with the document "DFÜ-Abkommen".</documentation>
</annotation>
</element>
<element name="OrderAttribute" type="ebics:OrderAttributeType">
<annotation>
<documentation xml:lang="de">Auftragsattribut.</documentation>
<documentation xml:lang="en">attribute describing the order contents.</documentation>
</annotation>
</element>
<element ref="ebics:OrderParams"/>
</sequence>
</complexType>
</schema>

166
test/xsd/ebics_response_H004.xsd Executable file
View File

@@ -0,0 +1,166 @@
<?xml version="1.0" encoding="UTF-8"?>
<schema xmlns="http://www.w3.org/2001/XMLSchema" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:ebics="urn:org:ebics:H004" targetNamespace="urn:org:ebics:H004" elementFormDefault="qualified" attributeFormDefault="unqualified" version="1.0">
<annotation>
<documentation xml:lang="de">ebics_response_H004.xsd ist das EBICS-Protokollschema für Antwortnachrichten.</documentation>
<documentation xml:lang="en">ebics_response_H004.xsd is the appropriate EBICS protocol schema for standard responses.</documentation>
</annotation>
<import namespace="http://www.w3.org/2000/09/xmldsig#" schemaLocation="xmldsig-core-schema.xsd">
<annotation>
<documentation xml:lang="de">XML-Signature.</documentation>
</annotation>
</import>
<include schemaLocation="ebics_types_H004.xsd"/>
<include schemaLocation="ebics_orders_H004.xsd"/>
<element name="ebicsResponse">
<annotation>
<documentation xml:lang="de">Electronic Banking Internet Communication Standard des Zentralen Kreditausschusses (ZKA): Multibankfähige Schnittstelle zur internetbasierten Kommunikation.</documentation>
<documentation xml:lang="en">Electronic Banking Internet Communication Standard of the "Zentraler Kreditausschuss (ZKA)": multi-bank capable interface for internet-based communication.</documentation>
</annotation>
<complexType>
<sequence>
<element name="header">
<annotation>
<documentation xml:lang="de">enthält die technischen Transaktionsdaten.</documentation>
<documentation xml:lang="en">contains the transaction-driven data.</documentation>
</annotation>
<complexType>
<sequence>
<element name="static" type="ebics:ResponseStaticHeaderType">
<annotation>
<documentation xml:lang="de">enhält alle festen Headereinträge.</documentation>
<documentation xml:lang="en">contains the static header entries.</documentation>
</annotation>
</element>
<element name="mutable" type="ebics:ResponseMutableHeaderType">
<annotation>
<documentation xml:lang="de">enthält alle variablen Headereinträge.</documentation>
<documentation xml:lang="en">contains the mutable header entries.</documentation>
</annotation>
</element>
</sequence>
<attributeGroup ref="ebics:AuthenticationMarker"/>
</complexType>
</element>
<element ref="ebics:AuthSignature">
<annotation>
<documentation xml:lang="de">Authentifikationssignatur.</documentation>
<documentation xml:lang="en">Authentication signature.</documentation>
</annotation>
</element>
<element name="body">
<annotation>
<documentation xml:lang="de">enthält die Auftragsdaten, EU(s) und weitere Nutzdaten.</documentation>
<documentation xml:lang="en">contains order data, order signature(s) and further data referring to the current order.</documentation>
</annotation>
<complexType>
<sequence>
<element name="DataTransfer" type="ebics:DataTransferResponseType" minOccurs="0">
<annotation>
<documentation xml:lang="de">Transfer von Auftragsdaten; nur bei Download anzugeben.</documentation>
<documentation xml:lang="en">Transfer of signature or order data; mandatory for downloads only.</documentation>
</annotation>
</element>
<element name="ReturnCode">
<annotation>
<documentation xml:lang="de">fachlicher Antwortcode für den vorangegangenen Request.</documentation>
<documentation xml:lang="en">order-related return code of the previous request.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:ReturnCodeType">
<attributeGroup ref="ebics:AuthenticationMarker"/>
</extension>
</simpleContent>
</complexType>
</element>
<element name="TimestampBankParameter" minOccurs="0">
<annotation>
<documentation xml:lang="de">Zeitstempel der letzten Aktualisierung der Bankparameter; nur in der Initialisierungsphase anzugeben.</documentation>
<documentation xml:lang="en">timestamp indicating the latest update of the bank parameters; may be set during initialisation phase only.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:TimestampType">
<attributeGroup ref="ebics:AuthenticationMarker"/>
</extension>
</simpleContent>
</complexType>
</element>
</sequence>
</complexType>
</element>
</sequence>
<attributeGroup ref="ebics:VersionAttrGroup"/>
<anyAttribute namespace="##targetNamespace" processContents="strict"/>
</complexType>
</element>
<complexType name="ResponseStaticHeaderType">
<annotation>
<documentation xml:lang="de">Datentyp für den statischen EBICS-Header.</documentation>
<documentation xml:lang="en">Data type for the static EBICS header.</documentation>
</annotation>
<sequence>
<element name="TransactionID" type="ebics:TransactionIDType" minOccurs="0">
<annotation>
<documentation xml:lang="de">eindeutige, technische Transaktions-ID; wird vom Server vergeben, falls OrderAttribute entweder gleich "OZHNN" oder gleich "DZHNN" ist und falls tatsächlich eine Transaktion erzeugt wurde.</documentation>
<documentation xml:lang="en">unique transaction ID, provided by the server if and only if the order attribute is set to either "OZHNN" or "DZHNN" and if a transaction has been established actually.</documentation>
</annotation>
</element>
<element name="NumSegments" type="ebics:SegmentNumberType" minOccurs="0">
<annotation>
<documentation xml:lang="de">Gesamtsegmentanzahl für diese Transaktion; nur bei Downloads in der Initialisierungsphase anzugeben.</documentation>
<documentation xml:lang="en">Total number of segments for this transaction; mandatory for downloads in initialisation phase only.</documentation>
</annotation>
</element>
</sequence>
</complexType>
<complexType name="ResponseMutableHeaderType">
<annotation>
<documentation xml:lang="de">Datentyp für den variablen EBICS-Header.</documentation>
<documentation xml:lang="en">Data type for the mutable EBICS header.</documentation>
</annotation>
<sequence>
<element name="TransactionPhase" type="ebics:TransactionPhaseType">
<annotation>
<documentation xml:lang="de">Phase, in der sich die Transaktion gerade befindet; wird bei jedem Transaktionsschritt vom Client gesetzt und vom Server übernommen.</documentation>
<documentation xml:lang="en">Current phase of the transaction; this information is provided by the client for each step of the transaction, and the server adopts the setting.</documentation>
</annotation>
</element>
<element name="SegmentNumber" minOccurs="0">
<annotation>
<documentation xml:lang="de">enthält die Nummer des aktuellen Segments, welches gerade übertragen oder angefordert wird; nur anzugeben bei TransactionPhase=Transfer und (bei Download) TransactionPhase=Initialisation.</documentation>
<documentation xml:lang="en">contains the number of the segment which is currently being transmitted or requested; mandatory for transaction phases 'Transfer' and (for downloads) 'Initialisation' only.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="ebics:SegmentNumberType">
<attribute name="lastSegment" type="boolean" use="required">
<annotation>
<documentation xml:lang="de">Ist dies das letzte Segment der Übertragung?</documentation>
</annotation>
</attribute>
</extension>
</simpleContent>
</complexType>
</element>
<element name="OrderID" type="ebics:OrderIDType" minOccurs="0">
<annotation>
<documentation xml:lang="de">Auftragsnummer von Sendeaufträgen gemäß DFÜ-Abkommen.</documentation>
</annotation>
</element>
<element name="ReturnCode" type="ebics:ReturnCodeType">
<annotation>
<documentation xml:lang="de">Rückmeldung des technischen Status mit einer eindeutigen Fehlernummer.</documentation>
<documentation xml:lang="en">Return code indicating the technical status.</documentation>
</annotation>
</element>
<element name="ReportText" type="ebics:ReportTextType">
<annotation>
<documentation xml:lang="de">Klartext der Rückmeldung des technischen Status.</documentation>
<documentation xml:lang="en">Textual interpretation of the returned technical status code.</documentation>
</annotation>
</element>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</complexType>
</schema>

217
test/xsd/ebics_signature.xsd Executable file
View File

@@ -0,0 +1,217 @@
<?xml version="1.0" encoding="UTF-8"?>
<schema xmlns="http://www.w3.org/2001/XMLSchema" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:esig="http://www.ebics.org/S001" targetNamespace="http://www.ebics.org/S001" elementFormDefault="qualified" attributeFormDefault="unqualified" version="1.0">
<import namespace="http://www.w3.org/2000/09/xmldsig#" schemaLocation="xmldsig-core-schema.xsd"/>
<annotation>
<documentation xml:lang="de">ebics_signature enthält Typdefinitionen für elektronische Unterschriften der Versionen A004, A005, A006 und folgende.</documentation>
<documentation xml:lang="en">ebics_EU contains type definitions for electronic signatures: versions A005, A006 and et sqq.</documentation>
</annotation>
<!-- Elementdefinitionen für die EU. Die XML-Klartext-Struktur wird im EBICS-Signaturdatenkontext binär interpretiert.-->
<element name="EBICSSignatureData" abstract="true">
<annotation>
<documentation xml:lang="de">XML-Strukturen für bankfachliche Elektronische Unterschriften (EUs).</documentation>
<documentation xml:lang="en">contains the digital signatures.</documentation>
</annotation>
</element>
<element name="UserSignatureData" type="esig:UserSignatureDataSigBookType" substitutionGroup="esig:EBICSSignatureData">
<annotation>
<documentation xml:lang="de">enthält die EUs der Teilnehmer.</documentation>
<documentation xml:lang="en">contains the digital signatures.</documentation>
</annotation>
</element>
<complexType name="UserSignatureDataSigBookType">
<annotation>
<documentation xml:lang="de">Datentyp für Signaturdaten des Teilnehmers beim EU-Transfer.</documentation>
<documentation xml:lang="en">Data type for digital signature data transferred using EBICS.</documentation>
</annotation>
<sequence>
<choice maxOccurs="unbounded">
<element name="OrderSignature">
<annotation>
<documentation xml:lang="de">bankfachliche Elektronische Unterschrift oder Transportunterschrift (Binärformat).</documentation>
<documentation xml:lang="en">Digital signature (either autorising an order or applied for transportation), binary format.</documentation>
</annotation>
<complexType>
<simpleContent>
<extension base="esig:OrderSignatureType">
<attribute name="PartnerID" use="required">
<annotation>
<documentation xml:lang="de">Kunden-ID des Unterzeichners.</documentation>
<documentation xml:lang="en">Customer ID of the signer.</documentation>
</annotation>
</attribute>
</extension>
</simpleContent>
</complexType>
</element>
<element name="OrderSignatureData" type="esig:OrderSignatureDataType">
<annotation>
<documentation xml:lang="de">bankfachliche Elektronische Unterschrift oder Transportunterschrift (strukturiertes Format).</documentation>
<documentation xml:lang="en">Digital signature (either autorising an order or applied for transportation), structured format.</documentation>
</annotation>
</element>
</choice>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</complexType>
<simpleType name="OrderSignatureType">
<annotation>
<documentation xml:lang="de">Datentyp für kryptographische Unterschriften.</documentation>
</annotation>
<restriction base="base64Binary"/>
</simpleType>
<element name="OrderSignatureData" type="esig:OrderSignatureDataType">
<annotation>
<documentation xml:lang="de">bankfachliche Elektronische Unterschrift oder Transportunterschrift (strukturiertes Format).</documentation>
<documentation xml:lang="en">Digital signature (either autorising an order or applied for transportation), structured format.</documentation>
</annotation>
</element>
<complexType name="OrderSignatureDataType">
<annotation>
<documentation xml:lang="de">Datentyp für bankfachliche Elektronische Unterschrift oder Transportunterschrift (strukturiertes Format).</documentation>
<documentation xml:lang="en">Data type according for a digital signature (either autorising an order or applied for transportation), structured format.</documentation>
</annotation>
<sequence>
<element name="SignatureVersion" type="esig:SignatureVersionType">
<annotation>
<documentation xml:lang="de">Version des Signaturverfahrens.</documentation>
<documentation xml:lang="en">Version of the algorithm used for signature creation.</documentation>
</annotation>
</element>
<element name="SignatureValue" type="base64Binary">
<annotation>
<documentation xml:lang="de">Digitale Signatur.</documentation>
<documentation xml:lang="en">Digital signature.</documentation>
</annotation>
</element>
<element name="PartnerID" type="esig:PartnerIDType">
<annotation>
<documentation xml:lang="de">Kunden-ID des Unterzeichners.</documentation>
<documentation xml:lang="en">Customer ID of the signer.</documentation>
</annotation>
</element>
<element name="UserID" type="esig:UserIDType">
<annotation>
<documentation xml:lang="de">Teilnehmer-ID.</documentation>
<documentation xml:lang="en">User ID.</documentation>
</annotation>
</element>
<element ref="ds:X509Data" minOccurs="0">
<annotation>
<documentation xml:lang="de">Parameter zur X.509-Funktionalität</documentation>
<documentation xml:lang="en">Parameter for X509Data</documentation>
</annotation>
</element>
</sequence>
</complexType>
<simpleType name="PartnerIDType">
<annotation>
<documentation xml:lang="de">Datentyp für eine Kunden-ID.</documentation>
</annotation>
<restriction base="token">
<maxLength value="35"/>
</restriction>
</simpleType>
<simpleType name="UserIDType">
<annotation>
<documentation xml:lang="de">Datentyp für eine Teilnehmer-ID.</documentation>
</annotation>
<restriction base="token">
<maxLength value="35"/>
</restriction>
</simpleType>
<simpleType name="SignatureVersionType">
<annotation>
<documentation xml:lang="de">Datentyp für Versionsnummern zur Elektronischen Unterschrift (EU).</documentation>
</annotation>
<restriction base="token">
<length value="4"/>
<pattern value="A\d{3}"/>
</restriction>
</simpleType>
<!-- Definitionen für die Uebertragung von oeffentlichen Signierschlüsseln. z.B. ueber EBICS mit INI, PUB, HCS.-->
<element name="SignaturePubKeyOrderData" type="esig:SignaturePubKeyOrderDataType">
<annotation>
<documentation xml:lang="de">Element für Public Key Dateien unabhängig von der Auftragsart / Geschäftsvorfall.</documentation>
</annotation>
</element>
<complexType name="SignaturePubKeyOrderDataType">
<annotation>
<documentation xml:lang="de">Datentyp für Public Key Dateien unabhängig von der Auftragsart / Geschäftsvorfall.</documentation>
</annotation>
<sequence>
<element name="SignaturePubKeyInfo" type="esig:SignaturePubKeyInfoType">
<annotation>
<documentation xml:lang="de">öffentlicher Signaturschlüssel.</documentation>
</annotation>
</element>
<element name="PartnerID" type="esig:PartnerIDType">
<annotation>
<documentation xml:lang="de">Kunden-ID.</documentation>
</annotation>
</element>
<element name="UserID" type="esig:UserIDType">
<annotation>
<documentation xml:lang="de">Teilnehmer-ID.</documentation>
</annotation>
</element>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</complexType>
<element name="SignaturePubKeyInfo" type="esig:SignaturePubKeyInfoType">
<annotation>
<documentation xml:lang="de">öffentlicher Signaturschlüssel.</documentation>
</annotation>
</element>
<complexType name="SignaturePubKeyInfoType">
<annotation>
<documentation xml:lang="de">Datentyp für öffentliche bankfachliche Schlüssel.</documentation>
</annotation>
<complexContent>
<extension base="esig:PubKeyInfoType">
<sequence>
<element name="SignatureVersion" type="esig:SignatureVersionType">
<annotation>
<documentation xml:lang="de">Version des EU-Signaturverfahrens.</documentation>
</annotation>
</element>
</sequence>
</extension>
</complexContent>
</complexType>
<complexType name="PubKeyInfoType">
<annotation>
<documentation xml:lang="de">Datentyp für die Darstellung eines öffentlichen RSA-Schlüssels als Exponent-Modulus-Kombination oder als X509-Zertifikat.</documentation>
</annotation>
<sequence>
<sequence>
<element ref="ds:X509Data" minOccurs="0"/>
<element name="PubKeyValue" type="esig:PubKeyValueType">
<annotation>
<documentation xml:lang="de">Darstellung als Exponent-Modulus-Kombination.</documentation>
</annotation>
</element>
</sequence>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</complexType>
<complexType name="PubKeyValueType">
<annotation>
<documentation xml:lang="de">Datentyp für die Exponent-Modulus-Darstellung eines öffentlichen RSA-Schlüssels.</documentation>
</annotation>
<sequence>
<element ref="ds:RSAKeyValue"/>
<element name="TimeStamp" type="esig:TimestampType" minOccurs="0">
<annotation>
<documentation xml:lang="de">Zeitpunkt der Generierung des Schlüssels.</documentation>
</annotation>
</element>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
</complexType>
<simpleType name="TimestampType">
<annotation>
<documentation xml:lang="de">Datentyp für Zeitstempel.</documentation>
</annotation>
<restriction base="dateTime"/>
</simpleType>
</schema>

2426
test/xsd/ebics_types_H004.xsd Executable file

File diff suppressed because it is too large Load Diff

7
test/xsd/test.xsd Normal file
View File

@@ -0,0 +1,7 @@
<?xml version="1.0" encoding="UTF-8"?>
<schema xmlns="http://www.w3.org/2001/XMLSchema" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:ebics="urn:org:ebics:H004" targetNamespace="urn:org:ebics:H004" elementFormDefault="qualified" attributeFormDefault="unqualified" version="1.0">
<annotation>
<documentation xml:lang="de">ebics_H004.xsd inkludiert alle Schemadateien des EBICS-Protokolls, um die Eindeutigkeit von Element- und Typnamen im EBCIS Namespace zu erzwingen.</documentation>
<documentation xml:lang="en">ebics_H004.xsd includes all schema files for the EBICS protocol in order to enforce unique element and type names in the EBICS namespace.</documentation>
</annotation>
</schema>

318
test/xsd/xmldsig-core-schema.xsd Executable file
View File

@@ -0,0 +1,318 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE schema
PUBLIC "-//W3C//DTD XMLSchema 200102//EN" "http://www.w3.org/2001/XMLSchema.dtd"
[
<!ATTLIST schema
xmlns:ds CDATA #FIXED "http://www.w3.org/2000/09/xmldsig#">
<!ENTITY dsig 'http://www.w3.org/2000/09/xmldsig#'>
<!ENTITY % p ''>
<!ENTITY % s ''>
]>
<!-- Schema for XML Signatures
http://www.w3.org/2000/09/xmldsig#
$Revision: 1.1 $ on $Date: 2002/02/08 20:32:26 $ by $Author: reagle $
Copyright 2001 The Internet Society and W3C (Massachusetts Institute
of Technology, Institut National de Recherche en Informatique et en
Automatique, Keio University). All Rights Reserved.
http://www.w3.org/Consortium/Legal/
This document is governed by the W3C Software License [1] as described
in the FAQ [2].
[1] http://www.w3.org/Consortium/Legal/copyright-software-19980720
[2] http://www.w3.org/Consortium/Legal/IPR-FAQ-20000620.html#DTD
-->
<schema xmlns="http://www.w3.org/2001/XMLSchema"
xmlns:ds="http://www.w3.org/2000/09/xmldsig#"
targetNamespace="http://www.w3.org/2000/09/xmldsig#"
version="0.1" elementFormDefault="qualified">
<!-- Basic Types Defined for Signatures -->
<simpleType name="CryptoBinary">
<restriction base="base64Binary">
</restriction>
</simpleType>
<!-- Start Signature -->
<element name="Signature" type="ds:SignatureType"/>
<complexType name="SignatureType">
<sequence>
<element ref="ds:SignedInfo"/>
<element ref="ds:SignatureValue"/>
<element ref="ds:KeyInfo" minOccurs="0"/>
<element ref="ds:Object" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
<attribute name="Id" type="ID" use="optional"/>
</complexType>
<element name="SignatureValue" type="ds:SignatureValueType"/>
<complexType name="SignatureValueType">
<simpleContent>
<extension base="base64Binary">
<attribute name="Id" type="ID" use="optional"/>
</extension>
</simpleContent>
</complexType>
<!-- Start SignedInfo -->
<element name="SignedInfo" type="ds:SignedInfoType"/>
<complexType name="SignedInfoType">
<sequence>
<element ref="ds:CanonicalizationMethod"/>
<element ref="ds:SignatureMethod"/>
<element ref="ds:Reference" maxOccurs="unbounded"/>
</sequence>
<attribute name="Id" type="ID" use="optional"/>
</complexType>
<element name="CanonicalizationMethod" type="ds:CanonicalizationMethodType"/>
<complexType name="CanonicalizationMethodType" mixed="true">
<sequence>
<any namespace="##any" minOccurs="0" maxOccurs="unbounded"/>
<!-- (0,unbounded) elements from (1,1) namespace -->
</sequence>
<attribute name="Algorithm" type="anyURI" use="required"/>
</complexType>
<element name="SignatureMethod" type="ds:SignatureMethodType"/>
<complexType name="SignatureMethodType" mixed="true">
<sequence>
<element name="HMACOutputLength" minOccurs="0" type="ds:HMACOutputLengthType"/>
<any namespace="##other" minOccurs="0" maxOccurs="unbounded"/>
<!-- (0,unbounded) elements from (1,1) external namespace -->
</sequence>
<attribute name="Algorithm" type="anyURI" use="required"/>
</complexType>
<!-- Start Reference -->
<element name="Reference" type="ds:ReferenceType"/>
<complexType name="ReferenceType">
<sequence>
<element ref="ds:Transforms" minOccurs="0"/>
<element ref="ds:DigestMethod"/>
<element ref="ds:DigestValue"/>
</sequence>
<attribute name="Id" type="ID" use="optional"/>
<attribute name="URI" type="anyURI" use="optional"/>
<attribute name="Type" type="anyURI" use="optional"/>
</complexType>
<element name="Transforms" type="ds:TransformsType"/>
<complexType name="TransformsType">
<sequence>
<element ref="ds:Transform" maxOccurs="unbounded"/>
</sequence>
</complexType>
<element name="Transform" type="ds:TransformType"/>
<complexType name="TransformType" mixed="true">
<choice minOccurs="0" maxOccurs="unbounded">
<any namespace="##other" processContents="lax"/>
<!-- (1,1) elements from (0,unbounded) namespaces -->
<element name="XPath" type="string"/>
</choice>
<attribute name="Algorithm" type="anyURI" use="required"/>
</complexType>
<!-- End Reference -->
<element name="DigestMethod" type="ds:DigestMethodType"/>
<complexType name="DigestMethodType" mixed="true">
<sequence>
<any namespace="##other" processContents="lax" minOccurs="0" maxOccurs="unbounded"/>
</sequence>
<attribute name="Algorithm" type="anyURI" use="required"/>
</complexType>
<element name="DigestValue" type="ds:DigestValueType"/>
<simpleType name="DigestValueType">
<restriction base="base64Binary"/>
</simpleType>
<!-- End SignedInfo -->
<!-- Start KeyInfo -->
<element name="KeyInfo" type="ds:KeyInfoType"/>
<complexType name="KeyInfoType" mixed="true">
<choice maxOccurs="unbounded">
<element ref="ds:KeyName"/>
<element ref="ds:KeyValue"/>
<element ref="ds:RetrievalMethod"/>
<element ref="ds:X509Data"/>
<element ref="ds:PGPData"/>
<element ref="ds:SPKIData"/>
<element ref="ds:MgmtData"/>
<any processContents="lax" namespace="##other"/>
<!-- (1,1) elements from (0,unbounded) namespaces -->
</choice>
<attribute name="Id" type="ID" use="optional"/>
</complexType>
<element name="KeyName" type="string"/>
<element name="MgmtData" type="string"/>
<element name="KeyValue" type="ds:KeyValueType"/>
<complexType name="KeyValueType" mixed="true">
<choice>
<element ref="ds:DSAKeyValue"/>
<element ref="ds:RSAKeyValue"/>
<any namespace="##other" processContents="lax"/>
</choice>
</complexType>
<element name="RetrievalMethod" type="ds:RetrievalMethodType"/>
<complexType name="RetrievalMethodType">
<sequence>
<element ref="ds:Transforms" minOccurs="0"/>
</sequence>
<attribute name="URI" type="anyURI"/>
<attribute name="Type" type="anyURI" use="optional"/>
</complexType>
<!-- Start X509Data -->
<element name="X509Data" type="ds:X509DataType"/>
<complexType name="X509DataType">
<sequence maxOccurs="unbounded">
<choice>
<element name="X509IssuerSerial" type="ds:X509IssuerSerialType"/>
<element name="X509SKI" type="base64Binary"/>
<element name="X509SubjectName" type="string"/>
<element name="X509Certificate" type="base64Binary"/>
<element name="X509CRL" type="base64Binary"/>
<any namespace="##other" processContents="lax"/>
</choice>
</sequence>
</complexType>
<complexType name="X509IssuerSerialType">
<sequence>
<element name="X509IssuerName" type="string"/>
<element name="X509SerialNumber" type="integer"/>
</sequence>
</complexType>
<!-- End X509Data -->
<!-- Begin PGPData -->
<element name="PGPData" type="ds:PGPDataType"/>
<complexType name="PGPDataType">
<choice>
<sequence>
<element name="PGPKeyID" type="base64Binary"/>
<element name="PGPKeyPacket" type="base64Binary" minOccurs="0"/>
<any namespace="##other" processContents="lax" minOccurs="0"
maxOccurs="unbounded"/>
</sequence>
<sequence>
<element name="PGPKeyPacket" type="base64Binary"/>
<any namespace="##other" processContents="lax" minOccurs="0"
maxOccurs="unbounded"/>
</sequence>
</choice>
</complexType>
<!-- End PGPData -->
<!-- Begin SPKIData -->
<element name="SPKIData" type="ds:SPKIDataType"/>
<complexType name="SPKIDataType">
<sequence maxOccurs="unbounded">
<element name="SPKISexp" type="base64Binary"/>
<any namespace="##other" processContents="lax" minOccurs="0"/>
</sequence>
</complexType>
<!-- End SPKIData -->
<!-- End KeyInfo -->
<!-- Start Object (Manifest, SignatureProperty) -->
<element name="Object" type="ds:ObjectType"/>
<complexType name="ObjectType" mixed="true">
<sequence minOccurs="0" maxOccurs="unbounded">
<any namespace="##any" processContents="lax"/>
</sequence>
<attribute name="Id" type="ID" use="optional"/>
<attribute name="MimeType" type="string" use="optional"/> <!-- add a grep facet -->
<attribute name="Encoding" type="anyURI" use="optional"/>
</complexType>
<element name="Manifest" type="ds:ManifestType"/>
<complexType name="ManifestType">
<sequence>
<element ref="ds:Reference" maxOccurs="unbounded"/>
</sequence>
<attribute name="Id" type="ID" use="optional"/>
</complexType>
<element name="SignatureProperties" type="ds:SignaturePropertiesType"/>
<complexType name="SignaturePropertiesType">
<sequence>
<element ref="ds:SignatureProperty" maxOccurs="unbounded"/>
</sequence>
<attribute name="Id" type="ID" use="optional"/>
</complexType>
<element name="SignatureProperty" type="ds:SignaturePropertyType"/>
<complexType name="SignaturePropertyType" mixed="true">
<choice maxOccurs="unbounded">
<any namespace="##other" processContents="lax"/>
<!-- (1,1) elements from (1,unbounded) namespaces -->
</choice>
<attribute name="Target" type="anyURI" use="required"/>
<attribute name="Id" type="ID" use="optional"/>
</complexType>
<!-- End Object (Manifest, SignatureProperty) -->
<!-- Start Algorithm Parameters -->
<simpleType name="HMACOutputLengthType">
<restriction base="integer"/>
</simpleType>
<!-- Start KeyValue Element-types -->
<element name="DSAKeyValue" type="ds:DSAKeyValueType"/>
<complexType name="DSAKeyValueType">
<sequence>
<sequence minOccurs="0">
<element name="P" type="ds:CryptoBinary"/>
<element name="Q" type="ds:CryptoBinary"/>
</sequence>
<element name="G" type="ds:CryptoBinary" minOccurs="0"/>
<element name="Y" type="ds:CryptoBinary"/>
<element name="J" type="ds:CryptoBinary" minOccurs="0"/>
<sequence minOccurs="0">
<element name="Seed" type="ds:CryptoBinary"/>
<element name="PgenCounter" type="ds:CryptoBinary"/>
</sequence>
</sequence>
</complexType>
<element name="RSAKeyValue" type="ds:RSAKeyValueType"/>
<complexType name="RSAKeyValueType">
<sequence>
<element name="Modulus" type="ds:CryptoBinary"/>
<element name="Exponent" type="ds:CryptoBinary"/>
</sequence>
</complexType>
<!-- End KeyValue Element-types -->
<!-- End Signature -->
</schema>