2020-06-12 23:04:36 +02:00
|
|
|
package jwt
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto"
|
|
|
|
"crypto/ecdsa"
|
|
|
|
"crypto/rand"
|
|
|
|
"errors"
|
|
|
|
"math/big"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
// Sadly this is missing from crypto/ecdsa compared to crypto/rsa
|
|
|
|
ErrECDSAVerification = errors.New("crypto/ecdsa: verification error")
|
|
|
|
)
|
|
|
|
|
2024-02-14 00:58:32 +01:00
|
|
|
// SigningMethodECDSA implements the ECDSA family of signing methods.
|
2020-06-12 23:04:36 +02:00
|
|
|
// Expects *ecdsa.PrivateKey for signing and *ecdsa.PublicKey for verification
|
|
|
|
type SigningMethodECDSA struct {
|
|
|
|
Name string
|
|
|
|
Hash crypto.Hash
|
|
|
|
KeySize int
|
|
|
|
CurveBits int
|
|
|
|
}
|
|
|
|
|
|
|
|
// Specific instances for EC256 and company
|
|
|
|
var (
|
|
|
|
SigningMethodES256 *SigningMethodECDSA
|
|
|
|
SigningMethodES384 *SigningMethodECDSA
|
|
|
|
SigningMethodES512 *SigningMethodECDSA
|
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
// ES256
|
|
|
|
SigningMethodES256 = &SigningMethodECDSA{"ES256", crypto.SHA256, 32, 256}
|
|
|
|
RegisterSigningMethod(SigningMethodES256.Alg(), func() SigningMethod {
|
|
|
|
return SigningMethodES256
|
|
|
|
})
|
|
|
|
|
|
|
|
// ES384
|
|
|
|
SigningMethodES384 = &SigningMethodECDSA{"ES384", crypto.SHA384, 48, 384}
|
|
|
|
RegisterSigningMethod(SigningMethodES384.Alg(), func() SigningMethod {
|
|
|
|
return SigningMethodES384
|
|
|
|
})
|
|
|
|
|
|
|
|
// ES512
|
|
|
|
SigningMethodES512 = &SigningMethodECDSA{"ES512", crypto.SHA512, 66, 521}
|
|
|
|
RegisterSigningMethod(SigningMethodES512.Alg(), func() SigningMethod {
|
|
|
|
return SigningMethodES512
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *SigningMethodECDSA) Alg() string {
|
|
|
|
return m.Name
|
|
|
|
}
|
|
|
|
|
2024-02-14 00:58:32 +01:00
|
|
|
// Verify implements token verification for the SigningMethod.
|
2020-06-12 23:04:36 +02:00
|
|
|
// For this verify method, key must be an ecdsa.PublicKey struct
|
2024-02-14 00:58:32 +01:00
|
|
|
func (m *SigningMethodECDSA) Verify(signingString string, sig []byte, key interface{}) error {
|
2020-06-12 23:04:36 +02:00
|
|
|
// Get the key
|
|
|
|
var ecdsaKey *ecdsa.PublicKey
|
|
|
|
switch k := key.(type) {
|
|
|
|
case *ecdsa.PublicKey:
|
|
|
|
ecdsaKey = k
|
|
|
|
default:
|
2024-07-05 22:37:44 +02:00
|
|
|
return newError("ECDSA verify expects *ecdsa.PublicKey", ErrInvalidKeyType)
|
2020-06-12 23:04:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if len(sig) != 2*m.KeySize {
|
|
|
|
return ErrECDSAVerification
|
|
|
|
}
|
|
|
|
|
|
|
|
r := big.NewInt(0).SetBytes(sig[:m.KeySize])
|
|
|
|
s := big.NewInt(0).SetBytes(sig[m.KeySize:])
|
|
|
|
|
|
|
|
// Create hasher
|
|
|
|
if !m.Hash.Available() {
|
|
|
|
return ErrHashUnavailable
|
|
|
|
}
|
|
|
|
hasher := m.Hash.New()
|
|
|
|
hasher.Write([]byte(signingString))
|
|
|
|
|
|
|
|
// Verify the signature
|
2021-07-29 22:48:58 +02:00
|
|
|
if verifystatus := ecdsa.Verify(ecdsaKey, hasher.Sum(nil), r, s); verifystatus {
|
2020-06-12 23:04:36 +02:00
|
|
|
return nil
|
|
|
|
}
|
2021-07-29 22:48:58 +02:00
|
|
|
|
|
|
|
return ErrECDSAVerification
|
2020-06-12 23:04:36 +02:00
|
|
|
}
|
|
|
|
|
2024-02-14 00:58:32 +01:00
|
|
|
// Sign implements token signing for the SigningMethod.
|
2020-06-12 23:04:36 +02:00
|
|
|
// For this signing method, key must be an ecdsa.PrivateKey struct
|
2024-02-14 00:58:32 +01:00
|
|
|
func (m *SigningMethodECDSA) Sign(signingString string, key interface{}) ([]byte, error) {
|
2020-06-12 23:04:36 +02:00
|
|
|
// Get the key
|
|
|
|
var ecdsaKey *ecdsa.PrivateKey
|
|
|
|
switch k := key.(type) {
|
|
|
|
case *ecdsa.PrivateKey:
|
|
|
|
ecdsaKey = k
|
|
|
|
default:
|
2024-07-05 22:37:44 +02:00
|
|
|
return nil, newError("ECDSA sign expects *ecdsa.PrivateKey", ErrInvalidKeyType)
|
2020-06-12 23:04:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create the hasher
|
|
|
|
if !m.Hash.Available() {
|
2024-02-14 00:58:32 +01:00
|
|
|
return nil, ErrHashUnavailable
|
2020-06-12 23:04:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
hasher := m.Hash.New()
|
|
|
|
hasher.Write([]byte(signingString))
|
|
|
|
|
|
|
|
// Sign the string and return r, s
|
|
|
|
if r, s, err := ecdsa.Sign(rand.Reader, ecdsaKey, hasher.Sum(nil)); err == nil {
|
|
|
|
curveBits := ecdsaKey.Curve.Params().BitSize
|
|
|
|
|
|
|
|
if m.CurveBits != curveBits {
|
2024-02-14 00:58:32 +01:00
|
|
|
return nil, ErrInvalidKey
|
2020-06-12 23:04:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
keyBytes := curveBits / 8
|
|
|
|
if curveBits%8 > 0 {
|
|
|
|
keyBytes += 1
|
|
|
|
}
|
|
|
|
|
2021-11-17 00:18:03 +01:00
|
|
|
// We serialize the outputs (r and s) into big-endian byte arrays
|
|
|
|
// padded with zeros on the left to make sure the sizes work out.
|
|
|
|
// Output must be 2*keyBytes long.
|
|
|
|
out := make([]byte, 2*keyBytes)
|
|
|
|
r.FillBytes(out[0:keyBytes]) // r is assigned to the first half of output.
|
|
|
|
s.FillBytes(out[keyBytes:]) // s is assigned to the second half of output.
|
2020-06-12 23:04:36 +02:00
|
|
|
|
2024-02-14 00:58:32 +01:00
|
|
|
return out, nil
|
2020-06-12 23:04:36 +02:00
|
|
|
} else {
|
2024-02-14 00:58:32 +01:00
|
|
|
return nil, err
|
2020-06-12 23:04:36 +02:00
|
|
|
}
|
|
|
|
}
|