aboutsummaryrefslogtreecommitdiffstats
path: root/vendor/github.com/dgrijalva/jwt-go/rsa.go
blob: 0ae0b1984e5ae0e6d7e351b6f1f9d5177f353898 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
package jwt

import (
    "crypto"
    "crypto/rand"
    "crypto/rsa"
)

// Implements the RSA family of signing methods signing methods
type SigningMethodRSA struct {
    Name string
    Hash crypto.Hash
}

// Specific instances for RS256 and company
var (
    SigningMethodRS256 *SigningMethodRSA
    SigningMethodRS384 *SigningMethodRSA
    SigningMethodRS512 *SigningMethodRSA
)

func init() {
    // RS256
    SigningMethodRS256 = &SigningMethodRSA{"RS256", crypto.SHA256}
    RegisterSigningMethod(SigningMethodRS256.Alg(), func() SigningMethod {
        return SigningMethodRS256
    })

    // RS384
    SigningMethodRS384 = &SigningMethodRSA{"RS384", crypto.SHA384}
    RegisterSigningMethod(SigningMethodRS384.Alg(), func() SigningMethod {
        return SigningMethodRS384
    })

    // RS512
    SigningMethodRS512 = &SigningMethodRSA{"RS512", crypto.SHA512}
    RegisterSigningMethod(SigningMethodRS512.Alg(), func() SigningMethod {
        return SigningMethodRS512
    })
}

func (m *SigningMethodRSA) Alg() string {
    return m.Name
}

// Implements the Verify method from SigningMethod
// For this signing method, must be an rsa.PublicKey structure.
func (m *SigningMethodRSA) Verify(signingString, signature string, key interface{}) error {
    var err error

    // Decode the signature
    var sig []byte
    if sig, err = DecodeSegment(signature); err != nil {
        return err
    }

    var rsaKey *rsa.PublicKey
    var ok bool

    if rsaKey, ok = key.(*rsa.PublicKey); !ok {
        return ErrInvalidKeyType
    }

    // Create hasher
    if !m.Hash.Available() {
        return ErrHashUnavailable
    }
    hasher := m.Hash.New()
    hasher.Write([]byte(signingString))

    // Verify the signature
    return rsa.VerifyPKCS1v15(rsaKey, m.Hash, hasher.Sum(nil), sig)
}

// Implements the Sign method from SigningMethod
// For this signing method, must be an rsa.PrivateKey structure.
func (m *SigningMethodRSA) Sign(signingString string, key interface{}) (string, error) {
    var rsaKey *rsa.PrivateKey
    var ok bool

    // Validate type of key
    if rsaKey, ok = key.(*rsa.PrivateKey); !ok {
        return "", ErrInvalidKey
    }

    // Create the hasher
    if !m.Hash.Available() {
        return "", ErrHashUnavailable
    }

    hasher := m.Hash.New()
    hasher.Write([]byte(signingString))

    // Sign the string and return the encoded bytes
    if sigBytes, err := rsa.SignPKCS1v15(rand.Reader, rsaKey, m.Hash, hasher.Sum(nil)); err == nil {
        return EncodeSegment(sigBytes), nil
    } else {
        return "", err
    }
}