Skip to content

Commit b7754f5

Browse files
committed
feat: add Jwk::from_decoding_key
Allow for constructing a Jwk from a decoding key. This allows it to be created from a DER encoded file, for example. This patch flattens JwkUtils but adds separate structs for RSA and EC component extraction.
1 parent abbc307 commit b7754f5

4 files changed

Lines changed: 187 additions & 82 deletions

File tree

src/crypto/aws_lc/mod.rs

Lines changed: 15 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ use aws_lc_rs::{
88

99
use crate::{
1010
Algorithm, DecodingKey, EncodingKey,
11-
crypto::{CryptoProvider, JwkUtils, JwtSigner, JwtVerifier},
11+
crypto::{CryptoProvider, JwtSigner, JwtVerifier},
1212
errors::{self, Error, ErrorKind},
1313
jwk::{EllipticCurve, ThumbprintHash},
1414
};
@@ -18,15 +18,23 @@ mod eddsa;
1818
mod hmac;
1919
mod rsa;
2020

21-
fn extract_rsa_public_key_components(key_content: &[u8]) -> errors::Result<(Vec<u8>, Vec<u8>)> {
21+
fn rsa_components_from_private_key(key_content: &[u8]) -> errors::Result<(Vec<u8>, Vec<u8>)> {
2222
let key_pair = aws_sig::RsaKeyPair::from_der(key_content)
2323
.map_err(|e| ErrorKind::InvalidRsaKey(e.to_string()))?;
2424
let public = key_pair.public_key();
2525
let components = aws_sig::RsaPublicKeyComponents::<Vec<u8>>::from(public);
2626
Ok((components.n, components.e))
2727
}
2828

29-
fn extract_ec_public_key_coordinates(
29+
fn rsa_components_from_public_key(key_content: &[u8]) -> errors::Result<(Vec<u8>, Vec<u8>)> {
30+
let public = aws_lc_rs::rsa::PublicKey::from_der(key_content)
31+
.map_err(|e| ErrorKind::InvalidRsaKey(e.to_string()))?;
32+
33+
let components = aws_sig::RsaPublicKeyComponents::<Vec<u8>>::from(&public);
34+
Ok((components.n, components.e))
35+
}
36+
37+
fn ec_components_from_private_key(
3038
key_content: &[u8],
3139
alg: Algorithm,
3240
) -> errors::Result<(EllipticCurve, Vec<u8>, Vec<u8>)> {
@@ -102,9 +110,8 @@ fn new_verifier(
102110
pub static DEFAULT_PROVIDER: CryptoProvider = CryptoProvider {
103111
signer_factory: new_signer,
104112
verifier_factory: new_verifier,
105-
jwk_utils: JwkUtils {
106-
extract_rsa_public_key_components,
107-
extract_ec_public_key_coordinates,
108-
compute_digest,
109-
},
113+
rsa_pub_components_from_private_key: rsa_components_from_private_key,
114+
rsa_pub_components_from_public_key: rsa_components_from_public_key,
115+
ec_pub_components_from_private_key: ec_components_from_private_key,
116+
compute_digest,
110117
};

src/crypto/mod.rs

Lines changed: 43 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,15 @@
1010
//! [`CryptoProvider`]: crate::crypto::CryptoProvider
1111
1212
use crate::algorithms::Algorithm;
13-
use crate::errors::Result;
13+
use crate::errors::{self, ErrorKind, Result};
1414
use crate::jwk::{EllipticCurve, ThumbprintHash};
1515
use crate::{DecodingKey, EncodingKey};
1616

17+
const NOT_INSTALLED_OR_UNIMPLEMENTED_ERROR: &'static str = r###"
18+
Could not automatically determine the process-level CryptoProvider from jsonwebtoken crate features, or your CryptoProvider does not support JWKs.
19+
Call CryptoProvider::install_default() before this point to select a provider manually, or make sure exactly one of the 'rust_crypto' and 'aws_lc_rs' features is enabled.
20+
See the documentation of the CryptoProvider type for more information.
21+
"###;
1722
/// `aws_lc_rs` based CryptoProvider.
1823
#[cfg(feature = "aws_lc_rs")]
1924
pub mod aws_lc;
@@ -85,8 +90,19 @@ pub struct CryptoProvider {
8590
pub signer_factory: fn(&Algorithm, &EncodingKey) -> Result<Box<dyn JwtSigner>>,
8691
/// A function that produces a [`JwtVerifier`] for a given [`Algorithm`]
8792
pub verifier_factory: fn(&Algorithm, &DecodingKey) -> Result<Box<dyn JwtVerifier>>,
88-
/// Struct with utility functions for JWK processing.
89-
pub jwk_utils: JwkUtils,
93+
/// Given a DER encoded private key, extract the RSA public key components (n, e)
94+
#[allow(clippy::type_complexity)]
95+
pub rsa_pub_components_from_private_key: fn(&[u8]) -> Result<(Vec<u8>, Vec<u8>)>,
96+
/// Given a DER encoded public key, extract the RSA public key components (n, e)
97+
#[allow(clippy::type_complexity)]
98+
pub rsa_pub_components_from_public_key: fn(&[u8]) -> Result<(Vec<u8>, Vec<u8>)>,
99+
/// Given a DER encoded private key and an algorithm, extract the associated curve
100+
/// and the EC public key components (x, y)
101+
#[allow(clippy::type_complexity)]
102+
pub ec_pub_components_from_private_key:
103+
fn(&[u8], Algorithm) -> Result<(EllipticCurve, Vec<u8>, Vec<u8>)>,
104+
/// Given some data and a name of a hash function, compute hash_function(data)
105+
pub compute_digest: fn(&[u8], ThumbprintHash) -> Vec<u8>,
90106
}
91107

92108
impl CryptoProvider {
@@ -123,49 +139,38 @@ See the documentation of the CryptoProvider type for more information.
123139
static INSTANCE: CryptoProvider = CryptoProvider {
124140
signer_factory: |_, _| panic!("{}", NOT_INSTALLED_ERROR),
125141
verifier_factory: |_, _| panic!("{}", NOT_INSTALLED_ERROR),
126-
jwk_utils: JwkUtils::new_unimplemented(),
142+
rsa_pub_components_from_private_key: |_| {
143+
panic!("{}", NOT_INSTALLED_OR_UNIMPLEMENTED_ERROR)
144+
},
145+
rsa_pub_components_from_public_key: |_| {
146+
panic!("{}", NOT_INSTALLED_OR_UNIMPLEMENTED_ERROR)
147+
},
148+
ec_pub_components_from_private_key: |_, _| {
149+
panic!("{}", NOT_INSTALLED_OR_UNIMPLEMENTED_ERROR)
150+
},
151+
compute_digest: |_, _| panic!("{}", NOT_INSTALLED_OR_UNIMPLEMENTED_ERROR),
127152
};
128153

129154
&INSTANCE
130155
}
131156
}
132157
}
133158

134-
/// Holds utility functions required for JWK processing.
135-
/// Use the [`JwkUtils::new_unimplemented`] function to initialize all values to dummies.
136-
#[derive(Clone, Debug)]
137-
pub struct JwkUtils {
138-
/// Given a DER encoded private key, extract the RSA public key components (n, e)
139-
#[allow(clippy::type_complexity)]
140-
pub extract_rsa_public_key_components: fn(&[u8]) -> Result<(Vec<u8>, Vec<u8>)>,
141-
/// Given a DER encoded private key and an algorithm, extract the associated curve
142-
/// and the EC public key components (x, y)
143-
#[allow(clippy::type_complexity)]
144-
pub extract_ec_public_key_coordinates:
145-
fn(&[u8], Algorithm) -> Result<(EllipticCurve, Vec<u8>, Vec<u8>)>,
146-
/// Given some data and a name of a hash function, compute hash_function(data)
147-
pub compute_digest: fn(&[u8], ThumbprintHash) -> Vec<u8>,
148-
}
149-
150-
impl JwkUtils {
151-
/// Initialises all values to dummies.
152-
/// Will lead to a panic when JWKs are required, so only use it if you don't want to support JWKs.
153-
pub const fn new_unimplemented() -> Self {
154-
const NOT_INSTALLED_OR_UNIMPLEMENTED_ERROR: &str = r###"
155-
Could not automatically determine the process-level CryptoProvider from jsonwebtoken crate features, or your CryptoProvider does not support JWKs.
156-
Call CryptoProvider::install_default() before this point to select a provider manually, or make sure exactly one of the 'rust_crypto' and 'aws_lc_rs' features is enabled.
157-
See the documentation of the CryptoProvider type for more information.
158-
"###;
159-
Self {
160-
extract_rsa_public_key_components: |_| {
161-
panic!("{}", NOT_INSTALLED_OR_UNIMPLEMENTED_ERROR)
162-
},
163-
extract_ec_public_key_coordinates: |_, _| {
164-
panic!("{}", NOT_INSTALLED_OR_UNIMPLEMENTED_ERROR)
165-
},
166-
compute_digest: |_, _| panic!("{}", NOT_INSTALLED_OR_UNIMPLEMENTED_ERROR),
167-
}
159+
pub(crate) fn ec_components_from_public_key(
160+
pub_bytes: &[u8],
161+
) -> errors::Result<(EllipticCurve, Vec<u8>, Vec<u8>)> {
162+
let (curve, pub_elem_bytes) = match pub_bytes.len() {
163+
65 => (EllipticCurve::P256, 32),
164+
97 => (EllipticCurve::P384, 48),
165+
_ => return Err(ErrorKind::InvalidEcdsaKey.into()),
166+
};
167+
168+
if pub_bytes[0] != 4 {
169+
return Err(ErrorKind::InvalidEcdsaKey.into());
168170
}
171+
172+
let (x, y) = pub_bytes[1..].split_at(pub_elem_bytes);
173+
Ok((curve, x.to_vec(), y.to_vec()))
169174
}
170175

171176
mod static_default {

src/crypto/rust_crypto/mod.rs

Lines changed: 18 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,15 @@
1-
use ::rsa::{RsaPrivateKey, pkcs1::DecodeRsaPrivateKey, traits::PublicKeyParts};
1+
use ::rsa::{
2+
RsaPrivateKey, RsaPublicKey,
3+
pkcs1::{DecodeRsaPrivateKey, DecodeRsaPublicKey},
4+
traits::PublicKeyParts,
5+
};
26
use p256::{ecdsa::SigningKey as P256SigningKey, pkcs8::DecodePrivateKey};
37
use p384::ecdsa::SigningKey as P384SigningKey;
48
use sha2::{Digest, Sha256, Sha384, Sha512};
59

610
use crate::{
711
Algorithm, DecodingKey, EncodingKey,
8-
crypto::{CryptoProvider, JwkUtils, JwtSigner, JwtVerifier},
12+
crypto::{CryptoProvider, JwtSigner, JwtVerifier},
913
errors::{self, Error, ErrorKind},
1014
jwk::{EllipticCurve, ThumbprintHash},
1115
};
@@ -15,14 +19,20 @@ mod eddsa;
1519
mod hmac;
1620
mod rsa;
1721

18-
fn extract_rsa_public_key_components(key_content: &[u8]) -> errors::Result<(Vec<u8>, Vec<u8>)> {
22+
fn rsa_components_from_private_key(key_content: &[u8]) -> errors::Result<(Vec<u8>, Vec<u8>)> {
1923
let private_key = RsaPrivateKey::from_pkcs1_der(key_content)
2024
.map_err(|e| ErrorKind::InvalidRsaKey(e.to_string()))?;
2125
let public_key = private_key.to_public_key();
2226
Ok((public_key.n().to_bytes_be(), public_key.e().to_bytes_be()))
2327
}
2428

25-
fn extract_ec_public_key_coordinates(
29+
fn rsa_components_from_public_key(key_content: &[u8]) -> errors::Result<(Vec<u8>, Vec<u8>)> {
30+
let public_key = RsaPublicKey::from_pkcs1_der(key_content)
31+
.map_err(|e| ErrorKind::InvalidRsaKey(e.to_string()))?;
32+
Ok((public_key.n().to_bytes_be(), public_key.e().to_bytes_be()))
33+
}
34+
35+
fn ec_components_from_private_key(
2636
key_content: &[u8],
2737
alg: Algorithm,
2838
) -> errors::Result<(EllipticCurve, Vec<u8>, Vec<u8>)> {
@@ -108,9 +118,8 @@ fn new_verifier(
108118
pub static DEFAULT_PROVIDER: CryptoProvider = CryptoProvider {
109119
signer_factory: new_signer,
110120
verifier_factory: new_verifier,
111-
jwk_utils: JwkUtils {
112-
extract_rsa_public_key_components,
113-
extract_ec_public_key_coordinates,
114-
compute_digest,
115-
},
121+
rsa_pub_components_from_private_key: rsa_components_from_private_key,
122+
rsa_pub_components_from_public_key: rsa_components_from_public_key,
123+
ec_pub_components_from_private_key: ec_components_from_private_key,
124+
compute_digest,
116125
};

0 commit comments

Comments
 (0)