summaryrefslogtreecommitdiff
path: root/src/server/api/2fa.ts
diff options
context:
space:
mode:
authorsyuilo <Syuilotan@yahoo.co.jp>2019-07-05 02:00:54 +0900
committersyuilo <Syuilotan@yahoo.co.jp>2019-07-05 02:00:54 +0900
commitd3edf0312572d765c379580766d8153e6fb7f9c4 (patch)
treeb76389c004b8add34a770a4d5f9d4ca73aa87fe7 /src/server/api/2fa.ts
parentCreate partial type definition for 'jsrsasign' (#5092) (diff)
downloadmisskey-d3edf0312572d765c379580766d8153e6fb7f9c4.tar.gz
misskey-d3edf0312572d765c379580766d8153e6fb7f9c4.tar.bz2
misskey-d3edf0312572d765c379580766d8153e6fb7f9c4.zip
Fix errors
Diffstat (limited to 'src/server/api/2fa.ts')
-rw-r--r--src/server/api/2fa.ts8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/server/api/2fa.ts b/src/server/api/2fa.ts
index bc5f6e6d7d..3bc4627a62 100644
--- a/src/server/api/2fa.ts
+++ b/src/server/api/2fa.ts
@@ -63,15 +63,15 @@ function verifyCertificateChain(certificates: string[]) {
const CACert = i + 1 >= certificates.length ? Cert : certificates[i + 1];
- const certStruct = jsrsasign.ASN1HEX.getTLVbyList(certificate.hex, 0, [0]);
+ const certStruct = jsrsasign.ASN1HEX.getTLVbyList(certificate.hex!, 0, [0]);
const algorithm = certificate.getSignatureAlgorithmField();
const signatureHex = certificate.getSignatureValueHex();
// Verify against CA
- const Signature = new jsrsasign.crypto.Signature({alg: algorithm});
+ const Signature = new jsrsasign.KJUR.crypto.Signature({alg: algorithm});
Signature.init(CACert);
Signature.updateHex(certStruct);
- valid = valid && Signature.verify(signatureHex); // true if CA signed the certificate
+ valid = valid && !!Signature.verify(signatureHex); // true if CA signed the certificate
}
return valid;
@@ -260,7 +260,7 @@ export const procedures = {
}
const certificateChain = header.x5c
- .map(key => PEMString(key))
+ .map((key: any) => PEMString(key))
.concat([GSR2]);
if (getCertSubject(certificateChain[0]).CN != 'attest.android.com') {