...
1 package jwt
2
3 import (
4 "crypto"
5 "crypto/ecdsa"
6 "crypto/rand"
7 "errors"
8 "math/big"
9 )
10
11 var (
12
13 ErrECDSAVerification = errors.New("crypto/ecdsa: verification error")
14 )
15
16
17
18 type SigningMethodECDSA struct {
19 Name string
20 Hash crypto.Hash
21 KeySize int
22 CurveBits int
23 }
24
25
26 var (
27 SigningMethodES256 *SigningMethodECDSA
28 SigningMethodES384 *SigningMethodECDSA
29 SigningMethodES512 *SigningMethodECDSA
30 )
31
32 func init() {
33
34 SigningMethodES256 = &SigningMethodECDSA{"ES256", crypto.SHA256, 32, 256}
35 RegisterSigningMethod(SigningMethodES256.Alg(), func() SigningMethod {
36 return SigningMethodES256
37 })
38
39
40 SigningMethodES384 = &SigningMethodECDSA{"ES384", crypto.SHA384, 48, 384}
41 RegisterSigningMethod(SigningMethodES384.Alg(), func() SigningMethod {
42 return SigningMethodES384
43 })
44
45
46 SigningMethodES512 = &SigningMethodECDSA{"ES512", crypto.SHA512, 66, 521}
47 RegisterSigningMethod(SigningMethodES512.Alg(), func() SigningMethod {
48 return SigningMethodES512
49 })
50 }
51
52 func (m *SigningMethodECDSA) Alg() string {
53 return m.Name
54 }
55
56
57
58 func (m *SigningMethodECDSA) Verify(signingString, signature string, key interface{}) error {
59 var err error
60
61
62 var sig []byte
63 if sig, err = DecodeSegment(signature); err != nil {
64 return err
65 }
66
67
68 var ecdsaKey *ecdsa.PublicKey
69 switch k := key.(type) {
70 case *ecdsa.PublicKey:
71 ecdsaKey = k
72 default:
73 return ErrInvalidKeyType
74 }
75
76 if len(sig) != 2*m.KeySize {
77 return ErrECDSAVerification
78 }
79
80 r := big.NewInt(0).SetBytes(sig[:m.KeySize])
81 s := big.NewInt(0).SetBytes(sig[m.KeySize:])
82
83
84 if !m.Hash.Available() {
85 return ErrHashUnavailable
86 }
87 hasher := m.Hash.New()
88 hasher.Write([]byte(signingString))
89
90
91 if verifystatus := ecdsa.Verify(ecdsaKey, hasher.Sum(nil), r, s); verifystatus {
92 return nil
93 }
94
95 return ErrECDSAVerification
96 }
97
98
99
100 func (m *SigningMethodECDSA) Sign(signingString string, key interface{}) (string, error) {
101
102 var ecdsaKey *ecdsa.PrivateKey
103 switch k := key.(type) {
104 case *ecdsa.PrivateKey:
105 ecdsaKey = k
106 default:
107 return "", ErrInvalidKeyType
108 }
109
110
111 if !m.Hash.Available() {
112 return "", ErrHashUnavailable
113 }
114
115 hasher := m.Hash.New()
116 hasher.Write([]byte(signingString))
117
118
119 if r, s, err := ecdsa.Sign(rand.Reader, ecdsaKey, hasher.Sum(nil)); err == nil {
120 curveBits := ecdsaKey.Curve.Params().BitSize
121
122 if m.CurveBits != curveBits {
123 return "", ErrInvalidKey
124 }
125
126 keyBytes := curveBits / 8
127 if curveBits%8 > 0 {
128 keyBytes += 1
129 }
130
131
132
133
134 out := make([]byte, 2*keyBytes)
135 r.FillBytes(out[0:keyBytes])
136 s.FillBytes(out[keyBytes:])
137
138 return EncodeSegment(out), nil
139 } else {
140 return "", err
141 }
142 }
143
View as plain text