2018-08-21 15:56:50 +02:00
|
|
|
// Copyright 2015 The Go Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package acme
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto"
|
|
|
|
"crypto/ecdsa"
|
2020-12-20 16:36:07 +01:00
|
|
|
"crypto/hmac"
|
2018-08-21 15:56:50 +02:00
|
|
|
"crypto/rand"
|
|
|
|
"crypto/rsa"
|
|
|
|
"crypto/sha256"
|
2020-12-20 16:36:07 +01:00
|
|
|
"crypto/sha512"
|
2018-08-21 15:56:50 +02:00
|
|
|
_ "crypto/sha512" // need for EC keys
|
2019-12-15 17:21:16 +01:00
|
|
|
"encoding/asn1"
|
2018-08-21 15:56:50 +02:00
|
|
|
"encoding/base64"
|
|
|
|
"encoding/json"
|
2020-12-20 16:36:07 +01:00
|
|
|
"errors"
|
2018-08-21 15:56:50 +02:00
|
|
|
"fmt"
|
2020-12-20 16:36:07 +01:00
|
|
|
"hash"
|
2018-08-21 15:56:50 +02:00
|
|
|
"math/big"
|
|
|
|
)
|
|
|
|
|
2020-12-20 16:36:07 +01:00
|
|
|
// MACAlgorithm represents a JWS MAC signature algorithm.
|
|
|
|
// See https://tools.ietf.org/html/rfc7518#section-3.1 for more details.
|
|
|
|
type MACAlgorithm string
|
|
|
|
|
|
|
|
const (
|
|
|
|
MACAlgorithmHS256 = MACAlgorithm("HS256")
|
|
|
|
MACAlgorithmHS384 = MACAlgorithm("HS384")
|
|
|
|
MACAlgorithmHS512 = MACAlgorithm("HS512")
|
|
|
|
)
|
|
|
|
|
2019-10-02 02:32:12 +02:00
|
|
|
// keyID is the account identity provided by a CA during registration.
|
|
|
|
type keyID string
|
|
|
|
|
|
|
|
// noKeyID indicates that jwsEncodeJSON should compute and use JWK instead of a KID.
|
|
|
|
// See jwsEncodeJSON for details.
|
|
|
|
const noKeyID = keyID("")
|
|
|
|
|
2019-11-20 06:30:46 +01:00
|
|
|
// noPayload indicates jwsEncodeJSON will encode zero-length octet string
|
|
|
|
// in a JWS request. This is called POST-as-GET in RFC 8555 and is used to make
|
|
|
|
// authenticated GET requests via POSTing with an empty payload.
|
|
|
|
// See https://tools.ietf.org/html/rfc8555#section-6.3 for more details.
|
|
|
|
const noPayload = ""
|
|
|
|
|
2020-12-20 16:36:07 +01:00
|
|
|
// jsonWebSignature can be easily serialized into a JWS following
|
|
|
|
// https://tools.ietf.org/html/rfc7515#section-3.2.
|
|
|
|
type jsonWebSignature struct {
|
|
|
|
Protected string `json:"protected"`
|
|
|
|
Payload string `json:"payload"`
|
|
|
|
Sig string `json:"signature"`
|
|
|
|
}
|
|
|
|
|
2018-08-21 15:56:50 +02:00
|
|
|
// jwsEncodeJSON signs claimset using provided key and a nonce.
|
2019-10-02 02:32:12 +02:00
|
|
|
// The result is serialized in JSON format containing either kid or jwk
|
|
|
|
// fields based on the provided keyID value.
|
|
|
|
//
|
|
|
|
// If kid is non-empty, its quoted value is inserted in the protected head
|
|
|
|
// as "kid" field value. Otherwise, JWK is computed using jwkEncode and inserted
|
|
|
|
// as "jwk" field value. The "jwk" and "kid" fields are mutually exclusive.
|
|
|
|
//
|
2018-08-21 15:56:50 +02:00
|
|
|
// See https://tools.ietf.org/html/rfc7515#section-7.
|
2019-10-02 02:32:12 +02:00
|
|
|
func jwsEncodeJSON(claimset interface{}, key crypto.Signer, kid keyID, nonce, url string) ([]byte, error) {
|
2019-05-13 17:38:53 +02:00
|
|
|
alg, sha := jwsHasher(key.Public())
|
2018-08-21 15:56:50 +02:00
|
|
|
if alg == "" || !sha.Available() {
|
|
|
|
return nil, ErrUnsupportedKey
|
|
|
|
}
|
2019-10-02 02:32:12 +02:00
|
|
|
var phead string
|
|
|
|
switch kid {
|
|
|
|
case noKeyID:
|
|
|
|
jwk, err := jwkEncode(key.Public())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
phead = fmt.Sprintf(`{"alg":%q,"jwk":%s,"nonce":%q,"url":%q}`, alg, jwk, nonce, url)
|
|
|
|
default:
|
|
|
|
phead = fmt.Sprintf(`{"alg":%q,"kid":%q,"nonce":%q,"url":%q}`, alg, kid, nonce, url)
|
|
|
|
}
|
2018-08-21 15:56:50 +02:00
|
|
|
phead = base64.RawURLEncoding.EncodeToString([]byte(phead))
|
2019-11-20 06:30:46 +01:00
|
|
|
var payload string
|
|
|
|
if claimset != noPayload {
|
|
|
|
cs, err := json.Marshal(claimset)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
payload = base64.RawURLEncoding.EncodeToString(cs)
|
2018-08-21 15:56:50 +02:00
|
|
|
}
|
|
|
|
hash := sha.New()
|
|
|
|
hash.Write([]byte(phead + "." + payload))
|
|
|
|
sig, err := jwsSign(key, sha, hash.Sum(nil))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-12-20 16:36:07 +01:00
|
|
|
enc := jsonWebSignature{
|
2018-08-21 15:56:50 +02:00
|
|
|
Protected: phead,
|
|
|
|
Payload: payload,
|
|
|
|
Sig: base64.RawURLEncoding.EncodeToString(sig),
|
|
|
|
}
|
|
|
|
return json.Marshal(&enc)
|
|
|
|
}
|
|
|
|
|
2020-12-20 16:36:07 +01:00
|
|
|
// jwsWithMAC creates and signs a JWS using the given key and algorithm.
|
|
|
|
// "rawProtected" and "rawPayload" should not be base64-URL-encoded.
|
|
|
|
func jwsWithMAC(key []byte, alg MACAlgorithm, rawProtected, rawPayload []byte) (*jsonWebSignature, error) {
|
|
|
|
if len(key) == 0 {
|
|
|
|
return nil, errors.New("acme: cannot sign JWS with an empty MAC key")
|
|
|
|
}
|
|
|
|
protected := base64.RawURLEncoding.EncodeToString(rawProtected)
|
|
|
|
payload := base64.RawURLEncoding.EncodeToString(rawPayload)
|
|
|
|
|
|
|
|
// Only HMACs are currently supported.
|
|
|
|
hmac, err := newHMAC(key, alg)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if _, err := hmac.Write([]byte(protected + "." + payload)); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
mac := hmac.Sum(nil)
|
|
|
|
|
|
|
|
return &jsonWebSignature{
|
|
|
|
Protected: protected,
|
|
|
|
Payload: payload,
|
|
|
|
Sig: base64.RawURLEncoding.EncodeToString(mac),
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2018-08-21 15:56:50 +02:00
|
|
|
// jwkEncode encodes public part of an RSA or ECDSA key into a JWK.
|
|
|
|
// The result is also suitable for creating a JWK thumbprint.
|
|
|
|
// https://tools.ietf.org/html/rfc7517
|
|
|
|
func jwkEncode(pub crypto.PublicKey) (string, error) {
|
|
|
|
switch pub := pub.(type) {
|
|
|
|
case *rsa.PublicKey:
|
|
|
|
// https://tools.ietf.org/html/rfc7518#section-6.3.1
|
|
|
|
n := pub.N
|
|
|
|
e := big.NewInt(int64(pub.E))
|
|
|
|
// Field order is important.
|
|
|
|
// See https://tools.ietf.org/html/rfc7638#section-3.3 for details.
|
|
|
|
return fmt.Sprintf(`{"e":"%s","kty":"RSA","n":"%s"}`,
|
|
|
|
base64.RawURLEncoding.EncodeToString(e.Bytes()),
|
|
|
|
base64.RawURLEncoding.EncodeToString(n.Bytes()),
|
|
|
|
), nil
|
|
|
|
case *ecdsa.PublicKey:
|
|
|
|
// https://tools.ietf.org/html/rfc7518#section-6.2.1
|
|
|
|
p := pub.Curve.Params()
|
|
|
|
n := p.BitSize / 8
|
|
|
|
if p.BitSize%8 != 0 {
|
|
|
|
n++
|
|
|
|
}
|
|
|
|
x := pub.X.Bytes()
|
|
|
|
if n > len(x) {
|
|
|
|
x = append(make([]byte, n-len(x)), x...)
|
|
|
|
}
|
|
|
|
y := pub.Y.Bytes()
|
|
|
|
if n > len(y) {
|
|
|
|
y = append(make([]byte, n-len(y)), y...)
|
|
|
|
}
|
|
|
|
// Field order is important.
|
|
|
|
// See https://tools.ietf.org/html/rfc7638#section-3.3 for details.
|
|
|
|
return fmt.Sprintf(`{"crv":"%s","kty":"EC","x":"%s","y":"%s"}`,
|
|
|
|
p.Name,
|
|
|
|
base64.RawURLEncoding.EncodeToString(x),
|
|
|
|
base64.RawURLEncoding.EncodeToString(y),
|
|
|
|
), nil
|
|
|
|
}
|
|
|
|
return "", ErrUnsupportedKey
|
|
|
|
}
|
|
|
|
|
|
|
|
// jwsSign signs the digest using the given key.
|
2019-05-13 17:38:53 +02:00
|
|
|
// The hash is unused for ECDSA keys.
|
2018-08-21 15:56:50 +02:00
|
|
|
func jwsSign(key crypto.Signer, hash crypto.Hash, digest []byte) ([]byte, error) {
|
2019-12-15 17:21:16 +01:00
|
|
|
switch pub := key.Public().(type) {
|
|
|
|
case *rsa.PublicKey:
|
|
|
|
return key.Sign(rand.Reader, digest, hash)
|
|
|
|
case *ecdsa.PublicKey:
|
|
|
|
sigASN1, err := key.Sign(rand.Reader, digest, hash)
|
2018-08-21 15:56:50 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-12-15 17:21:16 +01:00
|
|
|
|
|
|
|
var rs struct{ R, S *big.Int }
|
|
|
|
if _, err := asn1.Unmarshal(sigASN1, &rs); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
rb, sb := rs.R.Bytes(), rs.S.Bytes()
|
|
|
|
size := pub.Params().BitSize / 8
|
2018-08-21 15:56:50 +02:00
|
|
|
if size%8 > 0 {
|
|
|
|
size++
|
|
|
|
}
|
|
|
|
sig := make([]byte, size*2)
|
|
|
|
copy(sig[size-len(rb):], rb)
|
|
|
|
copy(sig[size*2-len(sb):], sb)
|
|
|
|
return sig, nil
|
|
|
|
}
|
2019-12-15 17:21:16 +01:00
|
|
|
return nil, ErrUnsupportedKey
|
2018-08-21 15:56:50 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// jwsHasher indicates suitable JWS algorithm name and a hash function
|
|
|
|
// to use for signing a digest with the provided key.
|
|
|
|
// It returns ("", 0) if the key is not supported.
|
2019-05-13 17:38:53 +02:00
|
|
|
func jwsHasher(pub crypto.PublicKey) (string, crypto.Hash) {
|
|
|
|
switch pub := pub.(type) {
|
|
|
|
case *rsa.PublicKey:
|
2018-08-21 15:56:50 +02:00
|
|
|
return "RS256", crypto.SHA256
|
2019-05-13 17:38:53 +02:00
|
|
|
case *ecdsa.PublicKey:
|
|
|
|
switch pub.Params().Name {
|
2018-08-21 15:56:50 +02:00
|
|
|
case "P-256":
|
|
|
|
return "ES256", crypto.SHA256
|
|
|
|
case "P-384":
|
|
|
|
return "ES384", crypto.SHA384
|
|
|
|
case "P-521":
|
|
|
|
return "ES512", crypto.SHA512
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return "", 0
|
|
|
|
}
|
|
|
|
|
2020-12-20 16:36:07 +01:00
|
|
|
// newHMAC returns an appropriate HMAC for the given MACAlgorithm.
|
|
|
|
func newHMAC(key []byte, alg MACAlgorithm) (hash.Hash, error) {
|
|
|
|
switch alg {
|
|
|
|
case MACAlgorithmHS256:
|
|
|
|
return hmac.New(sha256.New, key), nil
|
|
|
|
case MACAlgorithmHS384:
|
|
|
|
return hmac.New(sha512.New384, key), nil
|
|
|
|
case MACAlgorithmHS512:
|
|
|
|
return hmac.New(sha512.New, key), nil
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("acme: unsupported MAC algorithm: %v", alg)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-21 15:56:50 +02:00
|
|
|
// JWKThumbprint creates a JWK thumbprint out of pub
|
|
|
|
// as specified in https://tools.ietf.org/html/rfc7638.
|
|
|
|
func JWKThumbprint(pub crypto.PublicKey) (string, error) {
|
|
|
|
jwk, err := jwkEncode(pub)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
b := sha256.Sum256([]byte(jwk))
|
|
|
|
return base64.RawURLEncoding.EncodeToString(b[:]), nil
|
|
|
|
}
|