mirror of
https://github.com/bjc/prosody.git
synced 2025-04-03 21:27:38 +03:00
util.jwt: Add support for RSA-based algorithms (RS256, PS256)
This commit is contained in:
parent
d7b32f1b71
commit
0b0555c339
2 changed files with 205 additions and 14 deletions
|
@ -8,6 +8,9 @@ describe("util.jwt", function ()
|
|||
local ok, parsed = jwt.verify(key, token);
|
||||
assert.truthy(ok)
|
||||
assert.same({ payload = "this" }, parsed);
|
||||
|
||||
|
||||
|
||||
end);
|
||||
it("rejects invalid", function ()
|
||||
local key = "secret";
|
||||
|
@ -17,6 +20,21 @@ describe("util.jwt", function ()
|
|||
assert.falsy(ok)
|
||||
end);
|
||||
|
||||
it("validates HS256", function ()
|
||||
local verify = jwt.new_verifier("HS256", "your-256-bit-secret");
|
||||
|
||||
local result = {verify([[eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c]])};
|
||||
assert.same({
|
||||
true; -- success
|
||||
{ -- payload
|
||||
sub = "1234567890";
|
||||
name = "John Doe";
|
||||
iat = 1516239022;
|
||||
};
|
||||
}, result);
|
||||
|
||||
end);
|
||||
|
||||
it("validates ES256", function ()
|
||||
local private_key = [[
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
|
@ -66,5 +84,157 @@ q9UU8I5mEovUf86QZ7kOBIjJwqnzD1omageEHWwHdBO6B+dFabmdT9POxg==
|
|||
}, result);
|
||||
end);
|
||||
|
||||
it("validates RS256", function ()
|
||||
local private_key = [[
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQC7VJTUt9Us8cKj
|
||||
MzEfYyjiWA4R4/M2bS1GB4t7NXp98C3SC6dVMvDuictGeurT8jNbvJZHtCSuYEvu
|
||||
NMoSfm76oqFvAp8Gy0iz5sxjZmSnXyCdPEovGhLa0VzMaQ8s+CLOyS56YyCFGeJZ
|
||||
qgtzJ6GR3eqoYSW9b9UMvkBpZODSctWSNGj3P7jRFDO5VoTwCQAWbFnOjDfH5Ulg
|
||||
p2PKSQnSJP3AJLQNFNe7br1XbrhV//eO+t51mIpGSDCUv3E0DDFcWDTH9cXDTTlR
|
||||
ZVEiR2BwpZOOkE/Z0/BVnhZYL71oZV34bKfWjQIt6V/isSMahdsAASACp4ZTGtwi
|
||||
VuNd9tybAgMBAAECggEBAKTmjaS6tkK8BlPXClTQ2vpz/N6uxDeS35mXpqasqskV
|
||||
laAidgg/sWqpjXDbXr93otIMLlWsM+X0CqMDgSXKejLS2jx4GDjI1ZTXg++0AMJ8
|
||||
sJ74pWzVDOfmCEQ/7wXs3+cbnXhKriO8Z036q92Qc1+N87SI38nkGa0ABH9CN83H
|
||||
mQqt4fB7UdHzuIRe/me2PGhIq5ZBzj6h3BpoPGzEP+x3l9YmK8t/1cN0pqI+dQwY
|
||||
dgfGjackLu/2qH80MCF7IyQaseZUOJyKrCLtSD/Iixv/hzDEUPfOCjFDgTpzf3cw
|
||||
ta8+oE4wHCo1iI1/4TlPkwmXx4qSXtmw4aQPz7IDQvECgYEA8KNThCO2gsC2I9PQ
|
||||
DM/8Cw0O983WCDY+oi+7JPiNAJwv5DYBqEZB1QYdj06YD16XlC/HAZMsMku1na2T
|
||||
N0driwenQQWzoev3g2S7gRDoS/FCJSI3jJ+kjgtaA7Qmzlgk1TxODN+G1H91HW7t
|
||||
0l7VnL27IWyYo2qRRK3jzxqUiPUCgYEAx0oQs2reBQGMVZnApD1jeq7n4MvNLcPv
|
||||
t8b/eU9iUv6Y4Mj0Suo/AU8lYZXm8ubbqAlwz2VSVunD2tOplHyMUrtCtObAfVDU
|
||||
AhCndKaA9gApgfb3xw1IKbuQ1u4IF1FJl3VtumfQn//LiH1B3rXhcdyo3/vIttEk
|
||||
48RakUKClU8CgYEAzV7W3COOlDDcQd935DdtKBFRAPRPAlspQUnzMi5eSHMD/ISL
|
||||
DY5IiQHbIH83D4bvXq0X7qQoSBSNP7Dvv3HYuqMhf0DaegrlBuJllFVVq9qPVRnK
|
||||
xt1Il2HgxOBvbhOT+9in1BzA+YJ99UzC85O0Qz06A+CmtHEy4aZ2kj5hHjECgYEA
|
||||
mNS4+A8Fkss8Js1RieK2LniBxMgmYml3pfVLKGnzmng7H2+cwPLhPIzIuwytXywh
|
||||
2bzbsYEfYx3EoEVgMEpPhoarQnYPukrJO4gwE2o5Te6T5mJSZGlQJQj9q4ZB2Dfz
|
||||
et6INsK0oG8XVGXSpQvQh3RUYekCZQkBBFcpqWpbIEsCgYAnM3DQf3FJoSnXaMhr
|
||||
VBIovic5l0xFkEHskAjFTevO86Fsz1C2aSeRKSqGFoOQ0tmJzBEs1R6KqnHInicD
|
||||
TQrKhArgLXX4v3CddjfTRJkFWDbE/CkvKZNOrcf1nhaGCPspRJj2KUkj1Fhl9Cnc
|
||||
dn/RsYEONbwQSjIfMPkvxF+8HQ==
|
||||
-----END PRIVATE KEY-----
|
||||
]];
|
||||
local sign = jwt.new_signer("RS256", private_key);
|
||||
|
||||
local token = sign({
|
||||
sub = "1234567890";
|
||||
name = "John Doe";
|
||||
admin = true;
|
||||
iat = 1516239022;
|
||||
});
|
||||
|
||||
local public_key = [[
|
||||
-----BEGIN PUBLIC KEY-----
|
||||
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAu1SU1LfVLPHCozMxH2Mo
|
||||
4lgOEePzNm0tRgeLezV6ffAt0gunVTLw7onLRnrq0/IzW7yWR7QkrmBL7jTKEn5u
|
||||
+qKhbwKfBstIs+bMY2Zkp18gnTxKLxoS2tFczGkPLPgizskuemMghRniWaoLcyeh
|
||||
kd3qqGElvW/VDL5AaWTg0nLVkjRo9z+40RQzuVaE8AkAFmxZzow3x+VJYKdjykkJ
|
||||
0iT9wCS0DRTXu269V264Vf/3jvredZiKRkgwlL9xNAwxXFg0x/XFw005UWVRIkdg
|
||||
cKWTjpBP2dPwVZ4WWC+9aGVd+Gyn1o0CLelf4rEjGoXbAAEgAqeGUxrcIlbjXfbc
|
||||
mwIDAQAB
|
||||
-----END PUBLIC KEY-----
|
||||
]];
|
||||
local verify = jwt.new_verifier("RS256", public_key);
|
||||
|
||||
local result = {verify(token)};
|
||||
assert.same({
|
||||
true; -- success
|
||||
{ -- payload
|
||||
sub = "1234567890";
|
||||
name = "John Doe";
|
||||
admin = true;
|
||||
iat = 1516239022;
|
||||
};
|
||||
}, result);
|
||||
|
||||
local result = {verify[[eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWUsImlhdCI6MTUxNjIzOTAyMn0.NHVaYe26MbtOYhSKkoKYdFVomg4i8ZJd8_-RU8VNbftc4TSMb4bXP3l3YlNWACwyXPGffz5aXHc6lty1Y2t4SWRqGteragsVdZufDn5BlnJl9pdR_kdVFUsra2rWKEofkZeIC4yWytE58sMIihvo9H1ScmmVwBcQP6XETqYd0aSHp1gOa9RdUPDvoXQ5oqygTqVtxaDr6wUFKrKItgBMzWIdNZ6y7O9E0DhEPTbE9rfBo6KTFsHAZnMg4k68CDp2woYIaXbmYTWcvbzIuHO7_37GT79XdIwkm95QJ7hYC9RiwrV7mesbY4PAahERJawntho0my942XheVLmGwLMBkQ]]};
|
||||
assert.same({
|
||||
true; -- success
|
||||
{ -- payload
|
||||
sub = "1234567890";
|
||||
name = "John Doe";
|
||||
admin = true;
|
||||
iat = 1516239022;
|
||||
};
|
||||
}, result);
|
||||
end);
|
||||
|
||||
it("validates PS256", function ()
|
||||
local private_key = [[
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQC7VJTUt9Us8cKj
|
||||
MzEfYyjiWA4R4/M2bS1GB4t7NXp98C3SC6dVMvDuictGeurT8jNbvJZHtCSuYEvu
|
||||
NMoSfm76oqFvAp8Gy0iz5sxjZmSnXyCdPEovGhLa0VzMaQ8s+CLOyS56YyCFGeJZ
|
||||
qgtzJ6GR3eqoYSW9b9UMvkBpZODSctWSNGj3P7jRFDO5VoTwCQAWbFnOjDfH5Ulg
|
||||
p2PKSQnSJP3AJLQNFNe7br1XbrhV//eO+t51mIpGSDCUv3E0DDFcWDTH9cXDTTlR
|
||||
ZVEiR2BwpZOOkE/Z0/BVnhZYL71oZV34bKfWjQIt6V/isSMahdsAASACp4ZTGtwi
|
||||
VuNd9tybAgMBAAECggEBAKTmjaS6tkK8BlPXClTQ2vpz/N6uxDeS35mXpqasqskV
|
||||
laAidgg/sWqpjXDbXr93otIMLlWsM+X0CqMDgSXKejLS2jx4GDjI1ZTXg++0AMJ8
|
||||
sJ74pWzVDOfmCEQ/7wXs3+cbnXhKriO8Z036q92Qc1+N87SI38nkGa0ABH9CN83H
|
||||
mQqt4fB7UdHzuIRe/me2PGhIq5ZBzj6h3BpoPGzEP+x3l9YmK8t/1cN0pqI+dQwY
|
||||
dgfGjackLu/2qH80MCF7IyQaseZUOJyKrCLtSD/Iixv/hzDEUPfOCjFDgTpzf3cw
|
||||
ta8+oE4wHCo1iI1/4TlPkwmXx4qSXtmw4aQPz7IDQvECgYEA8KNThCO2gsC2I9PQ
|
||||
DM/8Cw0O983WCDY+oi+7JPiNAJwv5DYBqEZB1QYdj06YD16XlC/HAZMsMku1na2T
|
||||
N0driwenQQWzoev3g2S7gRDoS/FCJSI3jJ+kjgtaA7Qmzlgk1TxODN+G1H91HW7t
|
||||
0l7VnL27IWyYo2qRRK3jzxqUiPUCgYEAx0oQs2reBQGMVZnApD1jeq7n4MvNLcPv
|
||||
t8b/eU9iUv6Y4Mj0Suo/AU8lYZXm8ubbqAlwz2VSVunD2tOplHyMUrtCtObAfVDU
|
||||
AhCndKaA9gApgfb3xw1IKbuQ1u4IF1FJl3VtumfQn//LiH1B3rXhcdyo3/vIttEk
|
||||
48RakUKClU8CgYEAzV7W3COOlDDcQd935DdtKBFRAPRPAlspQUnzMi5eSHMD/ISL
|
||||
DY5IiQHbIH83D4bvXq0X7qQoSBSNP7Dvv3HYuqMhf0DaegrlBuJllFVVq9qPVRnK
|
||||
xt1Il2HgxOBvbhOT+9in1BzA+YJ99UzC85O0Qz06A+CmtHEy4aZ2kj5hHjECgYEA
|
||||
mNS4+A8Fkss8Js1RieK2LniBxMgmYml3pfVLKGnzmng7H2+cwPLhPIzIuwytXywh
|
||||
2bzbsYEfYx3EoEVgMEpPhoarQnYPukrJO4gwE2o5Te6T5mJSZGlQJQj9q4ZB2Dfz
|
||||
et6INsK0oG8XVGXSpQvQh3RUYekCZQkBBFcpqWpbIEsCgYAnM3DQf3FJoSnXaMhr
|
||||
VBIovic5l0xFkEHskAjFTevO86Fsz1C2aSeRKSqGFoOQ0tmJzBEs1R6KqnHInicD
|
||||
TQrKhArgLXX4v3CddjfTRJkFWDbE/CkvKZNOrcf1nhaGCPspRJj2KUkj1Fhl9Cnc
|
||||
dn/RsYEONbwQSjIfMPkvxF+8HQ==
|
||||
-----END PRIVATE KEY-----
|
||||
]];
|
||||
local sign = jwt.new_signer("PS256", private_key);
|
||||
|
||||
local token = sign({
|
||||
sub = "1234567890";
|
||||
name = "John Doe";
|
||||
admin = true;
|
||||
iat = 1516239022;
|
||||
});
|
||||
|
||||
local public_key = [[
|
||||
-----BEGIN PUBLIC KEY-----
|
||||
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAu1SU1LfVLPHCozMxH2Mo
|
||||
4lgOEePzNm0tRgeLezV6ffAt0gunVTLw7onLRnrq0/IzW7yWR7QkrmBL7jTKEn5u
|
||||
+qKhbwKfBstIs+bMY2Zkp18gnTxKLxoS2tFczGkPLPgizskuemMghRniWaoLcyeh
|
||||
kd3qqGElvW/VDL5AaWTg0nLVkjRo9z+40RQzuVaE8AkAFmxZzow3x+VJYKdjykkJ
|
||||
0iT9wCS0DRTXu269V264Vf/3jvredZiKRkgwlL9xNAwxXFg0x/XFw005UWVRIkdg
|
||||
cKWTjpBP2dPwVZ4WWC+9aGVd+Gyn1o0CLelf4rEjGoXbAAEgAqeGUxrcIlbjXfbc
|
||||
mwIDAQAB
|
||||
-----END PUBLIC KEY-----
|
||||
]];
|
||||
local verify = jwt.new_verifier("PS256", public_key);
|
||||
|
||||
local result = {verify(token)};
|
||||
assert.same({
|
||||
true; -- success
|
||||
{ -- payload
|
||||
sub = "1234567890";
|
||||
name = "John Doe";
|
||||
admin = true;
|
||||
iat = 1516239022;
|
||||
};
|
||||
}, result);
|
||||
|
||||
local result = {verify[[eyJhbGciOiJQUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWUsImlhdCI6MTUxNjIzOTAyMn0.iOeNU4dAFFeBwNj6qdhdvm-IvDQrTa6R22lQVJVuWJxorJfeQww5Nwsra0PjaOYhAMj9jNMO5YLmud8U7iQ5gJK2zYyepeSuXhfSi8yjFZfRiSkelqSkU19I-Ja8aQBDbqXf2SAWA8mHF8VS3F08rgEaLCyv98fLLH4vSvsJGf6ueZSLKDVXz24rZRXGWtYYk_OYYTVgR1cg0BLCsuCvqZvHleImJKiWmtS0-CymMO4MMjCy_FIl6I56NqLE9C87tUVpo1mT-kbg5cHDD8I7MjCW5Iii5dethB4Vid3mZ6emKjVYgXrtkOQ-JyGMh6fnQxEFN1ft33GX2eRHluK9eg]]};
|
||||
assert.same({
|
||||
true; -- success
|
||||
{ -- payload
|
||||
sub = "1234567890";
|
||||
name = "John Doe";
|
||||
admin = true;
|
||||
iat = 1516239022;
|
||||
};
|
||||
}, result);
|
||||
end);
|
||||
|
||||
end);
|
||||
|
||||
|
|
49
util/jwt.lua
49
util/jwt.lua
|
@ -66,8 +66,7 @@ local function new_hmac_algorithm(name, hmac)
|
|||
return { sign = sign, verify = verify, load_key = load_key };
|
||||
end
|
||||
|
||||
-- ES*** family
|
||||
local function new_ecdsa_algorithm(name, c_sign, c_verify)
|
||||
local function new_crypto_algorithm(name, key_type, c_sign, c_verify, sig_encode, sig_decode)
|
||||
local static_header = new_static_header(name);
|
||||
|
||||
return {
|
||||
|
@ -75,25 +74,27 @@ local function new_ecdsa_algorithm(name, c_sign, c_verify)
|
|||
local encoded_payload = json.encode(payload);
|
||||
local signed = static_header .. b64url(encoded_payload);
|
||||
|
||||
local der_sig = c_sign(private_key, signed);
|
||||
local signature = c_sign(private_key, signed);
|
||||
if sig_encode then
|
||||
signature = sig_encode(signature);
|
||||
end
|
||||
|
||||
local r, s = crypto.parse_ecdsa_signature(der_sig);
|
||||
|
||||
return signed.."."..b64url(r..s);
|
||||
return signed.."."..b64url(signature);
|
||||
end;
|
||||
|
||||
verify = function (public_key, blob)
|
||||
verify = function (public_key, blob)
|
||||
local signed, signature, raw_payload = decode_jwt(blob, name);
|
||||
if not signed then return nil, signature; end -- nil, err
|
||||
|
||||
local raw_signature = unb64url(signature);
|
||||
|
||||
local der_sig = crypto.build_ecdsa_signature(raw_signature:sub(1, 32), raw_signature:sub(33, 64));
|
||||
if not der_sig then
|
||||
signature = unb64url(signature);
|
||||
if sig_decode and signature then
|
||||
signature = sig_decode(signature);
|
||||
end
|
||||
if not signature then
|
||||
return false, "signature-mismatch";
|
||||
end
|
||||
|
||||
local verify_ok = c_verify(public_key, signed, der_sig);
|
||||
local verify_ok = c_verify(public_key, signed, signature);
|
||||
if not verify_ok then
|
||||
return false, "signature-mismatch";
|
||||
end
|
||||
|
@ -108,21 +109,41 @@ local function new_ecdsa_algorithm(name, c_sign, c_verify)
|
|||
|
||||
load_public_key = function (public_key_pem)
|
||||
local key = assert(crypto.import_public_pem(public_key_pem));
|
||||
assert(key:get_type() == "id-ecPublicKey", "incorrect key type");
|
||||
assert(key:get_type() == key_type, "incorrect key type");
|
||||
return key;
|
||||
end;
|
||||
|
||||
load_private_key = function (private_key_pem)
|
||||
local key = assert(crypto.import_private_pem(private_key_pem));
|
||||
assert(key:get_type() == "id-ecPublicKey", "incorrect key type");
|
||||
assert(key:get_type() == key_type, "incorrect key type");
|
||||
return key;
|
||||
end;
|
||||
};
|
||||
end
|
||||
|
||||
-- RS***, PS***
|
||||
local function new_rsa_algorithm(name, c_sign, c_verify)
|
||||
return new_crypto_algorithm(name, "rsaEncryption", c_sign, c_verify);
|
||||
end
|
||||
|
||||
-- ES***
|
||||
local function new_ecdsa_algorithm(name, c_sign, c_verify)
|
||||
local function encode_ecdsa_sig(der_sig)
|
||||
local r, s = crypto.parse_ecdsa_signature(der_sig);
|
||||
return r..s;
|
||||
end
|
||||
|
||||
local function decode_ecdsa_sig(jwk_sig)
|
||||
return crypto.build_ecdsa_signature(jwk_sig:sub(1, 32), jwk_sig:sub(33, 64));
|
||||
end
|
||||
return new_crypto_algorithm(name, "id-ecPublicKey", c_sign, c_verify, encode_ecdsa_sig, decode_ecdsa_sig);
|
||||
end
|
||||
|
||||
local algorithms = {
|
||||
HS256 = new_hmac_algorithm("HS256", hashes.hmac_sha256);
|
||||
ES256 = new_ecdsa_algorithm("ES256", crypto.ecdsa_sha256_sign, crypto.ecdsa_sha256_verify);
|
||||
RS256 = new_rsa_algorithm("RS256", crypto.rsassa_pkcs1_256_sign, crypto.rsassa_pkcs1_256_verify);
|
||||
PS256 = new_rsa_algorithm("PS256", crypto.rsassa_pss_256_sign, crypto.rsassa_pss_256_verify);
|
||||
};
|
||||
|
||||
local function new_signer(algorithm, key_input)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue