blob: c0e8c1b4fc4cdc2e9df9aa8732e4766ea7fcab83 [file] [log] [blame]
/* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <apr_lib.h>
#include <apr_strings.h>
#include <apr_tables.h>
#include <apr_buckets.h>
#include "md_crypt.h"
#include "md_json.h"
#include "md_jws.h"
#include "md_log.h"
#include "md_util.h"
apr_status_t md_jws_get_jwk(md_json_t **pjwk, apr_pool_t *p, struct md_pkey_t *pkey)
{
md_json_t *jwk;
if (!pkey) return APR_EINVAL;
jwk = md_json_create(p);
md_json_sets(md_pkey_get_rsa_e64(pkey, p), jwk, "e", NULL);
md_json_sets("RSA", jwk, "kty", NULL);
md_json_sets(md_pkey_get_rsa_n64(pkey, p), jwk, "n", NULL);
*pjwk = jwk;
return APR_SUCCESS;
}
apr_status_t md_jws_sign(md_json_t **pmsg, apr_pool_t *p,
md_data_t *payload, md_json_t *prot_fields,
struct md_pkey_t *pkey, const char *key_id)
{
md_json_t *msg, *jprotected, *jwk;
const char *prot64, *pay64, *sign64, *sign, *prot;
md_data_t data;
apr_status_t rv;
msg = md_json_create(p);
jprotected = md_json_clone(p, prot_fields);
md_json_sets("RS256", jprotected, "alg", NULL);
if (key_id) {
md_json_sets(key_id, jprotected, "kid", NULL);
}
else {
rv = md_jws_get_jwk(&jwk, p, pkey);
if (APR_SUCCESS != rv) {
md_log_perror(MD_LOG_MARK, MD_LOG_WARNING, rv, p, "get jwk");
goto cleanup;
}
md_json_setj(jwk, jprotected, "jwk", NULL);
}
prot = md_json_writep(jprotected, p, MD_JSON_FMT_COMPACT);
if (!prot) {
rv = APR_EINVAL;
md_log_perror(MD_LOG_MARK, MD_LOG_WARNING, rv, p, "serialize protected");
goto cleanup;
}
md_data_init(&data, prot, strlen(prot));
prot64 = md_util_base64url_encode(&data, p);
md_json_sets(prot64, msg, "protected", NULL);
pay64 = md_util_base64url_encode(payload, p);
md_json_sets(pay64, msg, "payload", NULL);
sign = apr_psprintf(p, "%s.%s", prot64, pay64);
rv = md_crypt_sign64(&sign64, pkey, p, sign, strlen(sign));
if (APR_SUCCESS != rv) {
md_log_perror(MD_LOG_MARK, MD_LOG_WARNING, rv, p, "jwk signed message");
goto cleanup;
}
md_json_sets(sign64, msg, "signature", NULL);
cleanup:
*pmsg = (APR_SUCCESS == rv)? msg : NULL;
return rv;
}
apr_status_t md_jws_pkey_thumb(const char **pthumb, apr_pool_t *p, struct md_pkey_t *pkey)
{
const char *e64, *n64, *s;
md_data_t data;
apr_status_t rv;
e64 = md_pkey_get_rsa_e64(pkey, p);
n64 = md_pkey_get_rsa_n64(pkey, p);
if (!e64 || !n64) {
return APR_EINVAL;
}
/* whitespace and order is relevant, since we hand out a digest of this */
s = apr_psprintf(p, "{\"e\":\"%s\",\"kty\":\"RSA\",\"n\":\"%s\"}", e64, n64);
md_data_init_str(&data, s);
rv = md_crypt_sha256_digest64(pthumb, p, &data);
return rv;
}
apr_status_t md_jws_hmac(md_json_t **pmsg, apr_pool_t *p,
md_data_t *payload, md_json_t *prot_fields,
const md_data_t *hmac_key)
{
md_json_t *msg, *jprotected;
const char *prot64, *pay64, *mac64, *sign, *prot;
md_data_t data;
apr_status_t rv;
msg = md_json_create(p);
jprotected = md_json_clone(p, prot_fields);
md_json_sets("HS256", jprotected, "alg", NULL);
prot = md_json_writep(jprotected, p, MD_JSON_FMT_COMPACT);
if (!prot) {
rv = APR_EINVAL;
md_log_perror(MD_LOG_MARK, MD_LOG_WARNING, rv, p, "serialize protected");
goto cleanup;
}
md_data_init(&data, prot, strlen(prot));
prot64 = md_util_base64url_encode(&data, p);
md_json_sets(prot64, msg, "protected", NULL);
pay64 = md_util_base64url_encode(payload, p);
md_json_sets(pay64, msg, "payload", NULL);
sign = apr_psprintf(p, "%s.%s", prot64, pay64);
rv = md_crypt_hmac64(&mac64, hmac_key, p, sign, strlen(sign));
if (APR_SUCCESS != rv) {
goto cleanup;
}
md_json_sets(mac64, msg, "signature", NULL);
cleanup:
*pmsg = (APR_SUCCESS == rv)? msg : NULL;
return rv;
}