| /*- |
| * Copyright 2014 Square Inc. |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package jose |
| |
| import ( |
| "crypto/x509" |
| "strings" |
| "testing" |
| ) |
| |
| const trustedCA = ` |
| -----BEGIN CERTIFICATE----- |
| MIIE6DCCAtCgAwIBAgIBATANBgkqhkiG9w0BAQsFADAUMRIwEAYDVQQDEwlUcnVz |
| dGVkQ0EwHhcNMTgwMzI4MTg0MzA0WhcNMzgwMzI4MTg0MzA0WjAUMRIwEAYDVQQD |
| EwlUcnVzdGVkQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCsHcd3 |
| uaKBilWQUe2epNf86xvq2HZV+JDULjJlKfUQAkpG+huHDEMiPEFPSlQK17bFj7gc |
| qOx/INeeCU2nBVtZDtlm3U0jfQWO2F2kZgH1JWnEArrAWWy3BP/NYv7apBLcl7nD |
| hkL4USVUnXF8mtuegiSMI2YT7TVchGzYMjrj/j+oRuDm1GF1OxoIMeUuVmqyJ6jK |
| Kxv9YVmCB+e/QaUltkPGwxl2dKWdBwECXDgSr7hcZhT8ANmgFR1dJjLCy0Us12yw |
| 5eKUANDlfNP+z9urykoAwHXpBlmga1ze45aL+p+7K+8sl/PgMqKO7VdT5GBsOCzf |
| xaBDG5Qy92Di34Sc27ZZz0mfaIy5kySnceBclMyWb8vdhEGkyHVsGpWc63JBmtg+ |
| bKeh876m7KVLfiykfpMqHUhq/ImQwiQTwX2RonFK5gP+XU0I9V+4rE0iqucbcvCS |
| HuHzhf6B+TybhalRsvOZ6GB/SokF5YCmf8ylAq4be/HSxnJQcBhpSSQp0zz4ZKOD |
| ikXuwf29yhWZ0lgIyaZpT9H4QecWNcyx4UcqO3wQAGjxadTG3gzjLu/OJwPkw+bK |
| RvXWSBZjlQ9+JPmrHH+oKMgHshR4TQmtmXqXLaarrAe+HXCZEiBKFOqPgeo2RMxr |
| LAO+MYIsVtEz39gISRhEvqcAls01sV1l7oGicQIDAQABo0UwQzAOBgNVHQ8BAf8E |
| BAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBATAdBgNVHQ4EFgQUy9Nqk0mDRwC5tcmN |
| xQ1YWO5MAhgwDQYJKoZIhvcNAQELBQADggIBAHbpsqY+tPSj8BSky+acZoZjF7fZ |
| Ae3MKVogwm5tecmwTKf5xDj9J99ZpGvcWCKtoxxWw0LZ+JI/aeqANSRDXZIelcIw |
| yZefw06z/coQJwAIy1RSoKJPV72mkG0Es9w2HxSEoLaZ9tql0TyV8D/QseUM8Yt/ |
| nNtShRoj6iMnZjhmut5pLfrLWHwQkt4fguBpL7rtydS/wAsOmnJ7lmOrU6zrBJzD |
| vEER3AJtgdIt4GvKf4MupKLgKvYDB4sUQVmMyAS78B9+WZDDRTClsx+/Oc1ggkWz |
| 8X7EmIw+3U9V2hd67qZ81EwcSB8ixV06E7ZcbhnJs7ds7swqUjwMArFWuzqO4cjW |
| 2BnyVzCO9pymFLI7qol32xCEgaQlOVS/kFHP3meygfeaeYe902sJw6NevOA4e0AO |
| AKR8FDfGRXJ9cOmYzeHeWKex8yt1Ul6+N8SXzjOhf39JM0QqTfHN7pPfFthTAFOs |
| 9rI/buJteJqR1WxgVk/jY4wLGEOcEyO6Y/Uj5iWWTvm5G/C1yZfSg+NvWoytxZ7P |
| 3S0qtEfmT4UwuHBsd5ZfEZoxb+GbqL/nhrKz/0B9LyKS0SJP9+mz7nSORz7t35Uc |
| BhiG6T9W7P/NRW4Tqb2tEN1VwU6eP5SEf7c7C1VVaepk0fvc1p5dl67IERqPucPD |
| dT2rDsCMBV7SXMUM |
| -----END CERTIFICATE-----` |
| |
| const intermediateCA = ` |
| -----BEGIN CERTIFICATE----- |
| MIIEHTCCAgWgAwIBAgIQXzZsEQv0cvSRLJAkS9FmWTANBgkqhkiG9w0BAQsFADAU |
| MRIwEAYDVQQDEwlUcnVzdGVkQ0EwHhcNMTgwMzI4MTg0MzMzWhcNMzgwMzI4MTg0 |
| MzAzWjAZMRcwFQYDVQQDEw5JbnRlcm1lZGlhdGVDQTCCASIwDQYJKoZIhvcNAQEB |
| BQADggEPADCCAQoCggEBAN3aYpH/1yEYf/kHuHWyO3AO4tgwlYYLhCDT2GvaPdaE |
| cqhe/VuYiqx3xY7IRDqsW2rau/OXgW6KzLHdRZHogK07hUj1Lfr7X+Oqbp22IV4y |
| dyiL7jwK9AtVXvDuuv5ET+oRfV82j0uhyk0ueGD9r6C/h+6NTzHBD+3xo6Yuc0Vk |
| BfY5zIyhaFqlm1aRYvupDRjC/63uBgAlrGxy2LyiTMVnYMuxoJM5ahDepz3sqjuN |
| WVyPhfGwIezjXuXRdEvlmWX05XLnsTdP4zu4fHq9Z7c3TKWWONM3z64ECAZmGQVf |
| MAcEDX7qP0gZX5PCT+0WcvTgTWE4Q+WIh5AmYyxQ04cCAwEAAaNmMGQwDgYDVR0P |
| AQH/BAQDAgEGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0OBBYEFMAYlq86RZzT |
| WxLpYE7KTTM7DHOuMB8GA1UdIwQYMBaAFMvTapNJg0cAubXJjcUNWFjuTAIYMA0G |
| CSqGSIb3DQEBCwUAA4ICAQBmYRpQoWEm5g16kwUrpwWrH7OIqqMtUhM1dcskECfk |
| i3/hcsV+MQRkGHLIItucYIWqs7oOQIglsyGcohAbnvE1PVtKKojUHC0lfbjgIenD |
| Pbvz15QB6A3KLDR82QbQGeGniACy924p66zlfPwHJbkMo5ZaqtNqI//EIa2YCpyy |
| okhFXaSFmPWXXrTOCsEEsFJKsoSCH1KUpTcwACGkkilNseg1edZB6/lBDwybxVuY |
| +dbUlHip3r5tFcP66Co3tKAaEcVY0AsZ/8GKwH+IM2AR6q7jdn9Gp2OX4E1ul9Wy |
| +hW5GHMmfixkgTVwRowuKgkCPEKV2/Xy3k9rlSpnKr2NpYYq0mu6An9HYt8THQ+e |
| wGZHwWufuDFDWuzlu7CxFOjpXLKv8qqVnwSFC91S3HsPAzPKLC9ZMEC+iQs2Vkes |
| Os0nFLZeMaMGAO5W6xiyQ5p94oo0bqa1XbmSV1bNp1HWuNEGIiZKrEUDxfYuDc6f |
| C6hJZKsjJkMkBeadlQAlLcjIx1rDV171CKLLTxy/dT5kv4p9UrJlnleyMVG6S/3d |
| 6nX/WLSgZIMYbOwiZVVPlSrobuG38ULJMCSuxndxD0l+HahJaH8vYXuR67A0XT+b |
| TEe305AI6A/9MEaRrActBnq6/OviQgBsKAvtTv1FmDbnpZsKeoFuwc3OPdTveQdC |
| RA== |
| -----END CERTIFICATE-----` |
| |
| func TestEmbeddedHMAC(t *testing.T) { |
| // protected: {"alg":"HS256", "jwk":{"kty":"oct", "k":"MTEx"}}, aka HMAC key. |
| msg := `{"payload":"TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ","protected":"eyJhbGciOiJIUzI1NiIsICJqd2siOnsia3R5Ijoib2N0IiwgImsiOiJNVEV4In19","signature":"lvo41ZZsuHwQvSh0uJtEXRR3vmuBJ7in6qMoD7p9jyo"}` |
| |
| _, err := ParseSigned(msg) |
| if err == nil { |
| t.Error("should not allow parsing JWS with embedded JWK with HMAC key") |
| } |
| } |
| |
| func TestCompactParseJWS(t *testing.T) { |
| // Should parse |
| msg := "eyJhbGciOiJYWVoifQ.cGF5bG9hZA.c2lnbmF0dXJl" |
| _, err := ParseSigned(msg) |
| if err != nil { |
| t.Error("Unable to parse valid message:", err) |
| } |
| |
| // Should parse (detached signature missing payload) |
| msg = "eyJhbGciOiJYWVoifQ..c2lnbmF0dXJl" |
| _, err = ParseSigned(msg) |
| if err != nil { |
| t.Error("Unable to parse valid message:", err) |
| } |
| |
| // Messages that should fail to parse |
| failures := []string{ |
| // Not enough parts |
| "eyJhbGciOiJYWVoifQ.cGF5bG9hZA", |
| // Invalid signature |
| "eyJhbGciOiJYWVoifQ.cGF5bG9hZA.////", |
| // Invalid payload |
| "eyJhbGciOiJYWVoifQ.////.c2lnbmF0dXJl", |
| // Invalid header |
| "////.eyJhbGciOiJYWVoifQ.c2lnbmF0dXJl", |
| // Invalid header |
| "cGF5bG9hZA.cGF5bG9hZA.c2lnbmF0dXJl", |
| } |
| |
| for i := range failures { |
| _, err = ParseSigned(failures[i]) |
| if err == nil { |
| t.Error("Able to parse invalid message") |
| } |
| } |
| } |
| |
| func TestFullParseJWS(t *testing.T) { |
| // Messages that should succeed to parse |
| successes := []string{ |
| "{\"payload\":\"CUJD\",\"signatures\":[{\"protected\":\"e30\",\"header\":{\"kid\":\"XYZ\"},\"signature\":\"CUJD\"},{\"protected\":\"e30\",\"signature\":\"CUJD\"}]}", |
| } |
| |
| for i := range successes { |
| _, err := ParseSigned(successes[i]) |
| if err != nil { |
| t.Error("Unble to parse valid message", err, successes[i]) |
| } |
| } |
| |
| // Messages that should fail to parse |
| failures := []string{ |
| // Empty |
| "{}", |
| // Invalid JSON |
| "{XX", |
| // Invalid protected header |
| "{\"payload\":\"CUJD\",\"signatures\":[{\"protected\":\"CUJD\",\"header\":{\"kid\":\"XYZ\"},\"signature\":\"CUJD\"}]}", |
| // Invalid protected header |
| "{\"payload\":\"CUJD\",\"protected\":\"CUJD\",\"header\":{\"kid\":\"XYZ\"},\"signature\":\"CUJD\"}", |
| // Invalid protected header |
| "{\"payload\":\"CUJD\",\"signatures\":[{\"protected\":\"###\",\"header\":{\"kid\":\"XYZ\"},\"signature\":\"CUJD\"}]}", |
| // Invalid payload |
| "{\"payload\":\"###\",\"signatures\":[{\"protected\":\"CUJD\",\"header\":{\"kid\":\"XYZ\"},\"signature\":\"CUJD\"}]}", |
| // Invalid payload |
| "{\"payload\":\"CUJD\",\"signatures\":[{\"protected\":\"e30\",\"header\":{\"kid\":\"XYZ\"},\"signature\":\"###\"}]}", |
| } |
| |
| for i := range failures { |
| _, err := ParseSigned(failures[i]) |
| if err == nil { |
| t.Error("Able to parse invalid message", err, failures[i]) |
| } |
| } |
| } |
| |
| func TestRejectUnprotectedJWSNonce(t *testing.T) { |
| // No need to test compact, since that's always protected |
| |
| // Flattened JSON |
| input := `{ |
| "header": { "nonce": "should-cause-an-error" }, |
| "payload": "does-not-matter", |
| "signature": "does-not-matter" |
| }` |
| _, err := ParseSigned(input) |
| if err == nil { |
| t.Error("JWS with an unprotected nonce parsed as valid.") |
| } else if err != ErrUnprotectedNonce { |
| t.Errorf("Improper error for unprotected nonce: %v", err) |
| } |
| |
| // Full JSON |
| input = `{ |
| "payload": "does-not-matter", |
| "signatures": [{ |
| "header": { "nonce": "should-cause-an-error" }, |
| "signature": "does-not-matter" |
| }] |
| }` |
| _, err = ParseSigned(input) |
| if err == nil { |
| t.Error("JWS with an unprotected nonce parsed as valid.") |
| } else if err != ErrUnprotectedNonce { |
| t.Errorf("Improper error for unprotected nonce: %v", err) |
| } |
| } |
| |
| func TestVerifyFlattenedWithIncludedUnprotectedKey(t *testing.T) { |
| input := `{ |
| "header": { |
| "alg": "RS256", |
| "jwk": { |
| "e": "AQAB", |
| "kty": "RSA", |
| "n": "tSwgy3ORGvc7YJI9B2qqkelZRUC6F1S5NwXFvM4w5-M0TsxbFsH5UH6adigV0jzsDJ5imAechcSoOhAh9POceCbPN1sTNwLpNbOLiQQ7RD5mY_pSUHWXNmS9R4NZ3t2fQAzPeW7jOfF0LKuJRGkekx6tXP1uSnNibgpJULNc4208dgBaCHo3mvaE2HV2GmVl1yxwWX5QZZkGQGjNDZYnjFfa2DKVvFs0QbAk21ROm594kAxlRlMMrvqlf24Eq4ERO0ptzpZgm_3j_e4hGRD39gJS7kAzK-j2cacFQ5Qi2Y6wZI2p-FCq_wiYsfEAIkATPBiLKl_6d_Jfcvs_impcXQ" |
| } |
| }, |
| "payload": "Zm9vCg", |
| "signature": "hRt2eYqBd_MyMRNIh8PEIACoFtmBi7BHTLBaAhpSU6zyDAFdEBaX7us4VB9Vo1afOL03Q8iuoRA0AT4akdV_mQTAQ_jhTcVOAeXPr0tB8b8Q11UPQ0tXJYmU4spAW2SapJIvO50ntUaqU05kZd0qw8-noH1Lja-aNnU-tQII4iYVvlTiRJ5g8_CADsvJqOk6FcHuo2mG643TRnhkAxUtazvHyIHeXMxydMMSrpwUwzMtln4ZJYBNx4QGEq6OhpAD_VSp-w8Lq5HOwGQoNs0bPxH1SGrArt67LFQBfjlVr94E1sn26p4vigXm83nJdNhWAMHHE9iV67xN-r29LT-FjA" |
| }` |
| |
| jws, err := ParseSigned(input) |
| if err != nil { |
| t.Error("Unable to parse valid message.") |
| } |
| if len(jws.Signatures) != 1 { |
| t.Error("Too many or too few signatures.") |
| } |
| sig := jws.Signatures[0] |
| if sig.Header.JSONWebKey == nil { |
| t.Error("No JWK in signature header.") |
| } |
| payload, err := jws.Verify(sig.Header.JSONWebKey) |
| if err != nil { |
| t.Errorf("Signature did not validate: %v", err) |
| } |
| if string(payload) != "foo\n" { |
| t.Errorf("Payload was incorrect: '%s' should have been 'foo\\n'", string(payload)) |
| } |
| } |
| |
| // Test verification of a detached signature |
| func TestDetachedVerifyJWS(t *testing.T) { |
| rsaPublicKey, err := x509.ParsePKIXPublicKey(fromBase64Bytes(` |
| MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3aLSGwbeX0ZA2Ha+EvELaIFGzO |
| 91+Q15JQc/tdGdCgGW3XAbrh7ZUhDh1XKzbs+UOQxqn3Eq4YOx18IG0WsJSuCaHQIxnDlZ |
| t/GP8WLwjMC0izlJLm2SyfM/EEoNpmTC3w6MQ2dHK7SZ9Zoq+sKijQd+V7CYdr8zHMpDrd |
| NKoEcR0HjmvzzdMoUChhkGH5TaNbZyollULTggepaYUKS8QphqdSDMWiSetKG+g6V87lv6 |
| CVYyK1FF6g7Esp5OOj5pNn3/bmF+7V+b7TvK91NCIlURCjE9toRgNoIP4TDnWRn/vvfZ3G |
| zNrtWmlizqz3r5KdvIs71ahWgMUSD4wfazrwIDAQAB`)) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| sampleMessages := []string{ |
| "eyJhbGciOiJSUzI1NiJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.YHX849fvekz6wJGeyqnQhFqyHFcUXNJKj3o2w3ddR46YLlsCopUJrlifRU_ZuTWzpYxt5oC--T2eoqMhlCvltSWrE5_1_EumqiMfAYsZULx9E6Jns7q3w7mttonYFSIh7aR3-yg2HMMfTCgoAY1y_AZ4VjXwHDcZ5gu1oZDYgvZF4uXtCmwT6e5YtR1m8abiWPF8BgoTG_BD3KV6ClLj_QQiNFdfdxAMDw7vKVOKG1T7BFtz6cDs2Q3ILS4To5E2IjcVSSYS8mi77EitCrWmrqbK_G3WCdKeUFGnMnyuKXaCDy_7FLpAZ6Z5RomRr5iskXeJZdZqIKcJV8zl4fpsPA", |
| "eyJhbGciOiJSUzM4NCJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.meyfoOTjAAjXHFYiNlU7EEnsYtbeUYeEglK6BL_cxISEr2YAGLr1Gwnn2HnucTnH6YilyRio7ZC1ohy_ZojzmaljPHqpr8kn1iqNFu9nFE2M16ZPgJi38-PGzppcDNliyzOQO-c7L-eA-v8Gfww5uyRaOJdiWg-hUJmeGBIngPIeLtSVmhJtz8oTeqeNdUOqQv7f7VRCuvagLhW1PcEM91VUS-gS0WEUXoXWZ2lp91No0v1O24izgX3__FKiX_16XhrOfAgJ82F61vjbTIQYwhexHPZyYTlXYt_scNRzFGhSKeGFin4zVdFLOXWJqKWdUd5IrDP5Nya3FSoWbWDXAg", |
| } |
| |
| for _, msg := range sampleMessages { |
| obj, err := ParseSigned(msg) |
| if err != nil { |
| t.Error("unable to parse message", msg, err) |
| continue |
| } |
| payload := obj.payload |
| obj.payload = nil |
| err = obj.DetachedVerify(payload, rsaPublicKey) |
| if err != nil { |
| t.Error("unable to verify message", msg, err) |
| continue |
| } |
| idx, _, err := obj.DetachedVerifyMulti(payload, rsaPublicKey) |
| if idx != 0 || err != nil { |
| t.Error("unable to verify message", msg, err) |
| continue |
| } |
| } |
| } |
| |
| func TestVerifyFlattenedWithPrivateProtected(t *testing.T) { |
| // The protected field contains a Private Header Parameter name, per |
| // https://tools.ietf.org/html/draft-ietf-jose-json-web-signature-41#section-4 |
| // Base64-decoded, it's '{"nonce":"8HIepUNFZUa-exKTrXVf4g"}' |
| input := `{"header":{"alg":"RS256","jwk":{"kty":"RSA","n":"7ixeydcbxxppzxrBphrW1atUiEZqTpiHDpI-79olav5XxAgWolHmVsJyxzoZXRxmtED8PF9-EICZWBGdSAL9ZTD0hLUCIsPcpdgT_LqNW3Sh2b2caPL2hbMF7vsXvnCGg9varpnHWuYTyRrCLUF9vM7ES-V3VCYTa7LcCSRm56Gg9r19qar43Z9kIKBBxpgt723v2cC4bmLmoAX2s217ou3uCpCXGLOeV_BesG4--Nl3pso1VhCfO85wEWjmW6lbv7Kg4d7Jdkv5DjDZfJ086fkEAYZVYGRpIgAvJBH3d3yKDCrSByUEud1bWuFjQBmMaeYOrVDXO_mbYg5PwUDMhw","e":"AQAB"}},"protected":"eyJub25jZSI6IjhISWVwVU5GWlVhLWV4S1RyWFZmNGcifQ","payload":"eyJjb250YWN0IjpbIm1haWx0bzpmb29AYmFyLmNvbSJdfQ","signature":"AyvVGMgXsQ1zTdXrZxE_gyO63pQgotL1KbI7gv6Wi8I7NRy0iAOkDAkWcTQT9pcCYApJ04lXfEDZfP5i0XgcFUm_6spxi5mFBZU-NemKcvK9dUiAbXvb4hB3GnaZtZiuVnMQUb_ku4DOaFFKbteA6gOYCnED_x7v0kAPHIYrQnvIa-KZ6pTajbV9348zgh9TL7NgGIIsTcMHd-Jatr4z1LQ0ubGa8tS300hoDhVzfoDQaEetYjCo1drR1RmdEN1SIzXdHOHfubjA3ZZRbrF_AJnNKpRRoIwzu1VayOhRmdy1qVSQZq_tENF4VrQFycEL7DhG7JLoXC4T2p1urwMlsw"}` |
| |
| jws, err := ParseSigned(input) |
| if err != nil { |
| t.Error("Unable to parse valid message.") |
| } |
| if len(jws.Signatures) != 1 { |
| t.Error("Too many or too few signatures.") |
| } |
| sig := jws.Signatures[0] |
| if sig.Header.JSONWebKey == nil { |
| t.Error("No JWK in signature header.") |
| } |
| payload, err := jws.Verify(sig.Header.JSONWebKey) |
| if err != nil { |
| t.Errorf("Signature did not validate: %v", err) |
| } |
| expected := "{\"contact\":[\"mailto:foo@bar.com\"]}" |
| if string(payload) != expected { |
| t.Errorf("Payload was incorrect: '%s' should have been '%s'", string(payload), expected) |
| } |
| } |
| |
| // Test vectors generated with nimbus-jose-jwt |
| func TestSampleNimbusJWSMessagesRSA(t *testing.T) { |
| rsaPublicKey, err := x509.ParsePKIXPublicKey(fromBase64Bytes(` |
| MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3aLSGwbeX0ZA2Ha+EvELaIFGzO |
| 91+Q15JQc/tdGdCgGW3XAbrh7ZUhDh1XKzbs+UOQxqn3Eq4YOx18IG0WsJSuCaHQIxnDlZ |
| t/GP8WLwjMC0izlJLm2SyfM/EEoNpmTC3w6MQ2dHK7SZ9Zoq+sKijQd+V7CYdr8zHMpDrd |
| NKoEcR0HjmvzzdMoUChhkGH5TaNbZyollULTggepaYUKS8QphqdSDMWiSetKG+g6V87lv6 |
| CVYyK1FF6g7Esp5OOj5pNn3/bmF+7V+b7TvK91NCIlURCjE9toRgNoIP4TDnWRn/vvfZ3G |
| zNrtWmlizqz3r5KdvIs71ahWgMUSD4wfazrwIDAQAB`)) |
| if err != nil { |
| panic(err) |
| } |
| |
| rsaSampleMessages := []string{ |
| "eyJhbGciOiJSUzI1NiJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.YHX849fvekz6wJGeyqnQhFqyHFcUXNJKj3o2w3ddR46YLlsCopUJrlifRU_ZuTWzpYxt5oC--T2eoqMhlCvltSWrE5_1_EumqiMfAYsZULx9E6Jns7q3w7mttonYFSIh7aR3-yg2HMMfTCgoAY1y_AZ4VjXwHDcZ5gu1oZDYgvZF4uXtCmwT6e5YtR1m8abiWPF8BgoTG_BD3KV6ClLj_QQiNFdfdxAMDw7vKVOKG1T7BFtz6cDs2Q3ILS4To5E2IjcVSSYS8mi77EitCrWmrqbK_G3WCdKeUFGnMnyuKXaCDy_7FLpAZ6Z5RomRr5iskXeJZdZqIKcJV8zl4fpsPA", |
| "eyJhbGciOiJSUzM4NCJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.meyfoOTjAAjXHFYiNlU7EEnsYtbeUYeEglK6BL_cxISEr2YAGLr1Gwnn2HnucTnH6YilyRio7ZC1ohy_ZojzmaljPHqpr8kn1iqNFu9nFE2M16ZPgJi38-PGzppcDNliyzOQO-c7L-eA-v8Gfww5uyRaOJdiWg-hUJmeGBIngPIeLtSVmhJtz8oTeqeNdUOqQv7f7VRCuvagLhW1PcEM91VUS-gS0WEUXoXWZ2lp91No0v1O24izgX3__FKiX_16XhrOfAgJ82F61vjbTIQYwhexHPZyYTlXYt_scNRzFGhSKeGFin4zVdFLOXWJqKWdUd5IrDP5Nya3FSoWbWDXAg", |
| "eyJhbGciOiJSUzUxMiJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.rQPz0PDh8KyE2AX6JorgI0MLwv-qi1tcWlz6tuZuWQG1hdrlzq5tR1tQg1evYNc_SDDX87DWTSKXT7JEqhKoFixLfZa13IJrOc7FB8r5ZLx7OwOBC4F--OWrvxMA9Y3MTJjPN3FemQePUo-na2vNUZv-YgkcbuOgbO3hTxwQ7j1JGuqy-YutXOFnccdXvntp3t8zYZ4Mg1It_IyL9pzgGqHIEmMV1pCFGHsDa-wStB4ffmdhrADdYZc0q_SvxUdobyC_XzZCz9ENzGIhgwYxyyrqg7kjqUGoKmCLmoSlUFW7goTk9IC5SXdUyLPuESxOWNfHoRClGav230GYjPFQFA", |
| "eyJhbGciOiJQUzI1NiJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.UTtxjsv_6x4CdlAmZfAW6Lun3byMjJbcwRp_OlPH2W4MZaZar7aql052mIB_ddK45O9VUz2aphYVRvKPZY8WHmvlTUU30bk0z_cDJRYB9eIJVMOiRCYj0oNkz1iEZqsP0YgngxwuUDv4Q4A6aJ0Bo5E_rZo3AnrVHMHUjPp_ZRRSBFs30tQma1qQ0ApK4Gxk0XYCYAcxIv99e78vldVRaGzjEZmQeAVZx4tGcqZP20vG1L84nlhSGnOuZ0FhR8UjRFLXuob6M7EqtMRoqPgRYw47EI3fYBdeSivAg98E5S8R7R1NJc7ef-l03RvfUSY0S3_zBq_4PlHK6A-2kHb__w", |
| "eyJhbGciOiJSUzM4NCJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.meyfoOTjAAjXHFYiNlU7EEnsYtbeUYeEglK6BL_cxISEr2YAGLr1Gwnn2HnucTnH6YilyRio7ZC1ohy_ZojzmaljPHqpr8kn1iqNFu9nFE2M16ZPgJi38-PGzppcDNliyzOQO-c7L-eA-v8Gfww5uyRaOJdiWg-hUJmeGBIngPIeLtSVmhJtz8oTeqeNdUOqQv7f7VRCuvagLhW1PcEM91VUS-gS0WEUXoXWZ2lp91No0v1O24izgX3__FKiX_16XhrOfAgJ82F61vjbTIQYwhexHPZyYTlXYt_scNRzFGhSKeGFin4zVdFLOXWJqKWdUd5IrDP5Nya3FSoWbWDXAg", |
| "eyJhbGciOiJSUzUxMiJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.rQPz0PDh8KyE2AX6JorgI0MLwv-qi1tcWlz6tuZuWQG1hdrlzq5tR1tQg1evYNc_SDDX87DWTSKXT7JEqhKoFixLfZa13IJrOc7FB8r5ZLx7OwOBC4F--OWrvxMA9Y3MTJjPN3FemQePUo-na2vNUZv-YgkcbuOgbO3hTxwQ7j1JGuqy-YutXOFnccdXvntp3t8zYZ4Mg1It_IyL9pzgGqHIEmMV1pCFGHsDa-wStB4ffmdhrADdYZc0q_SvxUdobyC_XzZCz9ENzGIhgwYxyyrqg7kjqUGoKmCLmoSlUFW7goTk9IC5SXdUyLPuESxOWNfHoRClGav230GYjPFQFA", |
| } |
| |
| for _, msg := range rsaSampleMessages { |
| obj, err := ParseSigned(msg) |
| if err != nil { |
| t.Error("unable to parse message", msg, err) |
| continue |
| } |
| payload, err := obj.Verify(rsaPublicKey) |
| if err != nil { |
| t.Error("unable to verify message", msg, err) |
| continue |
| } |
| if string(payload) != "Lorem ipsum dolor sit amet" { |
| t.Error("payload is not what we expected for msg", msg) |
| } |
| } |
| } |
| |
| // Test vectors generated with nimbus-jose-jwt |
| func TestSampleNimbusJWSMessagesEC(t *testing.T) { |
| ecPublicKeyP256, err := x509.ParsePKIXPublicKey(fromBase64Bytes("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEIg62jq6FyL1otEj9Up7S35BUrwGF9TVrAzrrY1rHUKZqYIGEg67u/imjgadVcr7y9Q32I0gB8W8FHqbqt696rA==")) |
| if err != nil { |
| panic(err) |
| } |
| ecPublicKeyP384, err := x509.ParsePKIXPublicKey(fromBase64Bytes("MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPXsVlqCtN2oTY+F+hFZm3M0ldYpb7IeeJM5wYmT0k1RaqzBFDhDMNnYK5Q5x+OyssZrAtHgYDFw02AVJhhng/eHRp7mqmL/vI3wbxJtrLKYldIbBA+9fYBQcKeibjlu5")) |
| if err != nil { |
| panic(err) |
| } |
| ecPublicKeyP521, err := x509.ParsePKIXPublicKey(fromBase64Bytes("MIGbMBAGByqGSM49AgEGBSuBBAAjA4GGAAQAa2w3MMJ5FWD6tSf68G+Wy5jIhWXOD3IA7pE5IC/myQzo1lWcD8KS57SM6nm4POtPcxyLmDhL7FLuh8DKoIZyvtAAdK8+tOQP7XXRlT2bkvzIuazp05It3TAPu00YzTIpKfDlc19Y1lvf7etrbFqhShD92B+hHmhT4ddrdbPCBDW8hvU=")) |
| if err != nil { |
| panic(err) |
| } |
| |
| ecPublicKeys := []interface{}{ecPublicKeyP256, ecPublicKeyP384, ecPublicKeyP521} |
| |
| ecSampleMessages := []string{ |
| "eyJhbGciOiJFUzI1NiJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.MEWJVlvGRQyzMEGOYm4rwuiwxrX-6LjnlbaRDAuhwmnBm2Gtn7pRpGXRTMFZUXsSGDz2L1p-Hz1qn8j9bFIBtQ", |
| "eyJhbGciOiJFUzM4NCJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.nbdjPnJPYQtVNNdBIx8-KbFKplTxrz-hnW5UNhYUY7SBkwHK4NZnqc2Lv4DXoA0aWHq9eiypgOh1kmyPWGEmqKAHUx0xdIEkBoHk3ZsbmhOQuq2jL_wcMUG6nTWNhLrB", |
| "eyJhbGciOiJFUzUxMiJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.AeYNFC1rwIgQv-5fwd8iRyYzvTaSCYTEICepgu9gRId-IW99kbSVY7yH0MvrQnqI-a0L8zwKWDR35fW5dukPAYRkADp3Y1lzqdShFcEFziUVGo46vqbiSajmKFrjBktJcCsfjKSaLHwxErF-T10YYPCQFHWb2nXJOOI3CZfACYqgO84g", |
| } |
| |
| for i, msg := range ecSampleMessages { |
| obj, err := ParseSigned(msg) |
| if err != nil { |
| t.Error("unable to parse message", msg, err) |
| continue |
| } |
| payload, err := obj.Verify(ecPublicKeys[i]) |
| if err != nil { |
| t.Error("unable to verify message", msg, err) |
| continue |
| } |
| if string(payload) != "Lorem ipsum dolor sit amet" { |
| t.Error("payload is not what we expected for msg", msg) |
| } |
| } |
| } |
| |
| // Test vectors generated with nimbus-jose-jwt |
| func TestSampleNimbusJWSMessagesHMAC(t *testing.T) { |
| hmacTestKey := fromHexBytes("DF1FA4F36FFA7FC42C81D4B3C033928D") |
| |
| hmacSampleMessages := []string{ |
| "eyJhbGciOiJIUzI1NiJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.W5tc_EUhxexcvLYEEOckyyvdb__M5DQIVpg6Nmk1XGM", |
| "eyJhbGciOiJIUzM4NCJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.sBu44lXOJa4Nd10oqOdYH2uz3lxlZ6o32QSGHaoGdPtYTDG5zvSja6N48CXKqdAh", |
| "eyJhbGciOiJIUzUxMiJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.M0yR4tmipsORIix-BitIbxEPGaxPchDfj8UNOpKuhDEfnb7URjGvCKn4nOlyQ1z9mG1FKbwnqR1hOVAWSzAU_w", |
| } |
| |
| for _, msg := range hmacSampleMessages { |
| obj, err := ParseSigned(msg) |
| if err != nil { |
| t.Error("unable to parse message", msg, err) |
| continue |
| } |
| payload, err := obj.Verify(hmacTestKey) |
| if err != nil { |
| t.Error("unable to verify message", msg, err) |
| continue |
| } |
| if string(payload) != "Lorem ipsum dolor sit amet" { |
| t.Error("payload is not what we expected for msg", msg) |
| } |
| } |
| } |
| |
| func TestHeaderFieldsCompact(t *testing.T) { |
| msg := "eyJhbGciOiJFUzUxMiJ9.TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ.AeYNFC1rwIgQv-5fwd8iRyYzvTaSCYTEICepgu9gRId-IW99kbSVY7yH0MvrQnqI-a0L8zwKWDR35fW5dukPAYRkADp3Y1lzqdShFcEFziUVGo46vqbiSajmKFrjBktJcCsfjKSaLHwxErF-T10YYPCQFHWb2nXJOOI3CZfACYqgO84g" |
| |
| obj, err := ParseSigned(msg) |
| if err != nil { |
| t.Fatal("unable to parse message", msg, err) |
| } |
| if obj.Signatures[0].Header.Algorithm != "ES512" { |
| t.Error("merged header did not contain expected alg value") |
| } |
| if obj.Signatures[0].Protected.Algorithm != "ES512" { |
| t.Error("protected header did not contain expected alg value") |
| } |
| if obj.Signatures[0].Unprotected.Algorithm != "" { |
| t.Error("unprotected header contained an alg value") |
| } |
| } |
| |
| func TestHeaderFieldsFull(t *testing.T) { |
| msg := `{"payload":"TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQ","protected":"eyJhbGciOiJFUzUxMiJ9","header":{"custom":"test"},"signature":"AeYNFC1rwIgQv-5fwd8iRyYzvTaSCYTEICepgu9gRId-IW99kbSVY7yH0MvrQnqI-a0L8zwKWDR35fW5dukPAYRkADp3Y1lzqdShFcEFziUVGo46vqbiSajmKFrjBktJcCsfjKSaLHwxErF-T10YYPCQFHWb2nXJOOI3CZfACYqgO84g"}` |
| |
| obj, err := ParseSigned(msg) |
| if err != nil { |
| t.Fatal("unable to parse message", msg, err) |
| } |
| if obj.Signatures[0].Header.Algorithm != "ES512" { |
| t.Error("merged header did not contain expected alg value") |
| } |
| if obj.Signatures[0].Protected.Algorithm != "ES512" { |
| t.Error("protected header did not contain expected alg value") |
| } |
| if obj.Signatures[0].Unprotected.Algorithm != "" { |
| t.Error("unprotected header contained an alg value") |
| } |
| if obj.Signatures[0].Unprotected.ExtraHeaders["custom"] != "test" { |
| t.Error("unprotected header did not contain custom header value") |
| } |
| } |
| |
| // Test vectors generated with nimbus-jose-jwt |
| func TestErrorMissingPayloadJWS(t *testing.T) { |
| _, err := (&rawJSONWebSignature{}).sanitized() |
| if err == nil { |
| t.Error("was able to parse message with missing payload") |
| } |
| if !strings.Contains(err.Error(), "missing payload") { |
| t.Errorf("unexpected error message, should contain 'missing payload': %s", err) |
| } |
| } |
| |
| // Test that a null value in the header doesn't panic |
| func TestNullHeaderValue(t *testing.T) { |
| msg := `{ |
| "payload": |
| "eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGF |
| tcGxlLmNvbS9pc19yb290Ijp0cnVlfQ", |
| "protected":"eyJhbGciOiJFUzI1NiIsIm5vbmNlIjpudWxsfQ", |
| "header": |
| {"kid":"e9bc097a-ce51-4036-9562-d2ade882db0d"}, |
| "signature": |
| "DtEhU3ljbEg8L38VWAfUAqOyKAM6-Xx-F4GawxaepmXFCgfTjDxw5djxLa8IS |
| lSApmWQxfKTUJqPP3-Kg6NU1Q" |
| }` |
| |
| defer func() { |
| if r := recover(); r != nil { |
| t.Errorf("ParseSigned panic'd when parsing a message with a null protected header value") |
| } |
| }() |
| ParseSigned(msg) |
| } |
| |
| // Test for bug: |
| // https://github.com/square/go-jose/issues/157 |
| func TestEmbedJWKBug(t *testing.T) { |
| signerKey := SigningKey{ |
| Key: &JSONWebKey{ |
| Key: rsaTestKey, |
| KeyID: "rsa-test-key", |
| }, |
| Algorithm: RS256, |
| } |
| |
| signer, err := NewSigner(signerKey, &SignerOptions{EmbedJWK: true}) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| signerNoEmbed, err := NewSigner(signerKey, &SignerOptions{EmbedJWK: false}) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| jws, err := signer.Sign([]byte("Lorem ipsum dolor sit amet")) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| jwsNoEmbed, err := signerNoEmbed.Sign([]byte("Lorem ipsum dolor sit amet")) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| // This used to panic with: |
| // json: error calling MarshalJSON for type *jose.JSONWebKey: square/go-jose: unknown key type '%!s(<nil>)' |
| output := jws.FullSerialize() |
| outputNoEmbed := jwsNoEmbed.FullSerialize() |
| |
| // Expected output with embed set to true is a JWS with the public JWK embedded, with kid header empty. |
| // Expected output with embed set to false is that we set the kid header for key identification instead. |
| parsed, err := ParseSigned(output) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| parsedNoEmbed, err := ParseSigned(outputNoEmbed) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| if parsed.Signatures[0].Header.KeyID != "" { |
| t.Error("expected kid field in protected header to be empty") |
| } |
| if parsed.Signatures[0].Header.JSONWebKey.KeyID != "rsa-test-key" { |
| t.Error("expected rsa-test-key to be kid in embedded JWK in protected header") |
| } |
| if parsedNoEmbed.Signatures[0].Header.KeyID != "rsa-test-key" { |
| t.Error("expected kid field in protected header to be rsa-test-key") |
| } |
| if parsedNoEmbed.Signatures[0].Header.JSONWebKey != nil { |
| t.Error("expected no embedded JWK to be present") |
| } |
| } |
| |
| func TestJWSWithCertificateChain(t *testing.T) { |
| signerKey := SigningKey{ |
| Key: rsaTestKey, |
| Algorithm: RS256, |
| } |
| |
| certs := []string{ |
| // CN=TrustedSigner, signed by IntermediateCA |
| "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", |
| // CN=IntermediateCA, signed by TrustedCA |
| "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", |
| } |
| |
| testCases := []struct { |
| // Cert chain to embed in message |
| chain []string |
| // Intermediates & root certificate to verify against |
| intermediates []string |
| root string |
| // Should this test case verify? |
| success bool |
| }{ |
| {certs, nil, trustedCA, true}, |
| {certs, []string{intermediateCA}, trustedCA, true}, |
| {certs[0:1], nil, intermediateCA, true}, |
| {certs[0:1], nil, trustedCA, false}, |
| {[]string{}, nil, trustedCA, false}, |
| } |
| |
| for i, testCase := range testCases { |
| signer, err := NewSigner(signerKey, &SignerOptions{ |
| ExtraHeaders: map[HeaderKey]interface{}{HeaderKey("x5c"): testCase.chain}, |
| }) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| signed, err := signer.Sign([]byte("Lorem ipsum dolor sit amet")) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| parsed, err := ParseSigned(signed.FullSerialize()) |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| opts := x509.VerifyOptions{ |
| DNSName: "TrustedSigner", |
| Roots: x509.NewCertPool(), |
| } |
| |
| ok := opts.Roots.AppendCertsFromPEM([]byte(testCase.root)) |
| if !ok { |
| t.Fatal("failed to parse trusted root certificate") |
| } |
| |
| if len(testCase.intermediates) > 0 { |
| opts.Intermediates = x509.NewCertPool() |
| for _, intermediate := range testCase.intermediates { |
| ok := opts.Intermediates.AppendCertsFromPEM([]byte(intermediate)) |
| if !ok { |
| t.Fatal("failed to parse trusted root certificate") |
| } |
| } |
| } |
| |
| chains, err := parsed.Signatures[0].Protected.Certificates(opts) |
| if testCase.success && (len(chains) == 0 || err != nil) { |
| t.Fatalf("failed to verify certificate chain for test case %d: %s", i, err) |
| } |
| if !testCase.success && (len(chains) != 0 && err == nil) { |
| t.Fatalf("incorrectly verified certificate chain for test case %d (should fail)", i) |
| } |
| } |
| } |