-
Notifications
You must be signed in to change notification settings - Fork 374
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
JWK OKP Ed25519 support using rbnacl
- Prepare to deprecate the ::JWT::JWK::[RSA/EC/HMAC]#keypair method in favor of methods describing the use
- Loading branch information
Showing
14 changed files
with
377 additions
and
55 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,110 @@ | ||
# frozen_string_literal: true | ||
|
||
module JWT | ||
module JWK | ||
class OKPRbNaCl < KeyBase | ||
KTY = 'OKP' | ||
KTYS = [KTY, JWT::JWK::OKPRbNaCl, RbNaCl::Signatures::Ed25519::SigningKey, RbNaCl::Signatures::Ed25519::VerifyKey].freeze | ||
OKP_PUBLIC_KEY_ELEMENTS = %i[kty n x].freeze | ||
OKP_PRIVATE_KEY_ELEMENTS = %i[d].freeze | ||
|
||
def initialize(key, params = nil, options = {}) | ||
params ||= {} | ||
|
||
# For backwards compatibility when kid was a String | ||
params = { kid: params } if params.is_a?(String) | ||
|
||
key_params = extract_key_params(key) | ||
|
||
params = params.transform_keys(&:to_sym) | ||
check_jwk_params!(key_params, params) | ||
super(options, key_params.merge(params)) | ||
end | ||
|
||
def verify_key | ||
return @verify_key if defined?(@verify_key) | ||
|
||
@verify_key = verify_key_from_parameters | ||
end | ||
|
||
def signing_key | ||
return @signing_key if defined?(@signing_key) | ||
|
||
@signing_key = signing_key_from_parameters | ||
end | ||
|
||
def key_digest | ||
Thumbprint.new(self).to_s | ||
end | ||
|
||
def private? | ||
!signing_key.nil? | ||
end | ||
|
||
def members | ||
OKP_PUBLIC_KEY_ELEMENTS.each_with_object({}) { |i, h| h[i] = self[i] } | ||
end | ||
|
||
def export(options = {}) | ||
exported = parameters.clone | ||
exported.reject! { |k, _| OKP_PRIVATE_KEY_ELEMENTS.include?(k) } unless private? && options[:include_private] == true | ||
exported | ||
end | ||
|
||
private | ||
|
||
def extract_key_params(key) | ||
case key | ||
when JWT::JWK::KeyBase | ||
key.export(include_private: true) | ||
when RbNaCl::Signatures::Ed25519::SigningKey | ||
@signing_key = key | ||
@verify_key = key.verify_key | ||
parse_okp_key_params(@verify_key, @signing_key) | ||
when RbNaCl::Signatures::Ed25519::VerifyKey | ||
@signing_key = nil | ||
@verify_key = key | ||
parse_okp_key_params(@verify_key) | ||
when Hash | ||
key.transform_keys(&:to_sym) | ||
else | ||
raise ArgumentError, 'key must be of type RbNaCl::Signatures::Ed25519::SigningKey, RbNaCl::Signatures::Ed25519::VerifyKey or Hash with key parameters' | ||
end | ||
end | ||
|
||
def check_jwk_params!(key_params, _given_params) | ||
raise JWT::JWKError, "Incorrect 'kty' value: #{key_params[:kty]}, expected #{KTY}" unless key_params[:kty] == KTY | ||
end | ||
|
||
def parse_okp_key_params(verify_key, signing_key = nil) | ||
params = { | ||
kty: KTY, | ||
crv: 'Ed25519', | ||
x: ::JWT::Base64.url_encode(verify_key.to_bytes) | ||
} | ||
|
||
if signing_key | ||
params[:d] = ::JWT::Base64.url_encode(signing_key.to_bytes) | ||
end | ||
|
||
params | ||
end | ||
|
||
def verify_key_from_parameters | ||
RbNaCl::Signatures::Ed25519::VerifyKey.new(::JWT::Base64.url_decode(self[:x])) | ||
end | ||
|
||
def signing_key_from_parameters | ||
return nil unless self[:d] | ||
|
||
RbNaCl::Signatures::Ed25519::SigningKey.new(::JWT::Base64.url_decode(self[:d])) | ||
end | ||
|
||
class << self | ||
def import(jwk_data) | ||
new(jwk_data) | ||
end | ||
end | ||
end | ||
end | ||
end |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.