Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implementation of ECAlgorithm.from_jwk #500

Merged
merged 2 commits into from
Aug 24, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
62 changes: 62 additions & 0 deletions jwt/algorithms.py
Original file line number Diff line number Diff line change
Expand Up @@ -44,6 +44,7 @@
Ed25519PrivateKey,
Ed25519PublicKey,
)
from cryptography.utils import int_from_bytes

has_crypto = True
except ImportError:
Expand Down Expand Up @@ -439,6 +440,67 @@ def verify(self, msg, key, sig):
except InvalidSignature:
return False

@staticmethod
def from_jwk(jwk):

try:
obj = json.loads(jwk)
except ValueError:
raise InvalidKeyError("Key is not valid JSON")

if obj.get("kty") != "EC":
raise InvalidKeyError("Not an Elliptic curve key")

if "x" not in obj or "y" not in obj:
raise InvalidKeyError("Not an Elliptic curve key")

x = base64url_decode(force_bytes(obj.get("x")))
y = base64url_decode(force_bytes(obj.get("y")))

curve = obj.get("crv")
if curve == "P-256":
if len(x) == len(y) == 32:
curve_obj = ec.SECP256R1()
else:
raise InvalidKeyError(
"Coords should be 32 bytes for curve P-256"
)
elif curve == "P-384":
if len(x) == len(y) == 48:
curve_obj = ec.SECP384R1()
else:
raise InvalidKeyError(
"Coords should be 48 bytes for curve P-384"
)
elif curve == "P-521":
if len(x) == len(y) == 66:
curve_obj = ec.SECP521R1()
else:
raise InvalidKeyError(
"Coords should be 66 bytes for curve P-521"
)
else:
raise InvalidKeyError("Invalid curve: {}".format(curve))

public_numbers = ec.EllipticCurvePublicNumbers(
x=int_from_bytes(x, "big"),
y=int_from_bytes(y, "big"),
curve=curve_obj,
)

if "d" not in obj:
return public_numbers.public_key(default_backend())

d = base64url_decode(force_bytes(obj.get("d")))
if len(d) != len(x):
raise InvalidKeyError(
"D should be {} bytes for curve {}", len(x), curve
)

return ec.EllipticCurvePrivateNumbers(
int_from_bytes(d, "big"), public_numbers
).private_key(default_backend())

class RSAPSSAlgorithm(RSAAlgorithm):
"""
Performs a signature using RSASSA-PSS with MGF1
Expand Down
8 changes: 5 additions & 3 deletions tests/keys/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -44,11 +44,13 @@ def load_ec_key():

return ec.EllipticCurvePrivateNumbers(
private_value=decode_value(keyobj["d"]),
public_numbers=load_ec_pub_key().public_numbers(),
public_numbers=load_ec_pub_key_p_521().public_numbers(),
)

def load_ec_pub_key():
with open(os.path.join(BASE_PATH, "jwk_ec_pub.json")) as infile:
def load_ec_pub_key_p_521():
with open(
os.path.join(BASE_PATH, "jwk_ec_pub_P-521.json"), "r"
) as infile:
keyobj = json.load(infile)

return ec.EllipticCurvePublicNumbers(
Expand Down
9 changes: 0 additions & 9 deletions tests/keys/jwk_ec_key.json

This file was deleted.

8 changes: 8 additions & 0 deletions tests/keys/jwk_ec_key_P-256.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
{
"kty": "EC",
"kid": "bilbo.baggins.256@hobbiton.example",
"crv": "P-256",
"x": "PTTjIY84aLtaZCxLTrG_d8I0G6YKCV7lg8M4xkKfwQ4=",
"y": "ank6KA34vv24HZLXlChVs85NEGlpg2sbqNmR_BcgyJU=",
"d": "9GJquUJf57a9sev-u8-PoYlIezIPqI_vGpIaiu4zyZk="
}
8 changes: 8 additions & 0 deletions tests/keys/jwk_ec_key_P-384.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
{
"kty": "EC",
"kid": "bilbo.baggins.384@hobbiton.example",
"crv": "P-384",
"x": "IDC-5s6FERlbC4Nc_4JhKW8sd51AhixtMdNUtPxhRFP323QY6cwWeIA3leyZhz-J",
"y": "eovmN9ocANS8IJxDAGSuC1FehTq5ZFLJU7XSPg36zHpv4H2byKGEcCBiwT4sFJsy",
"d": "xKPj5IXjiHpQpLOgyMGo6lg_DUp738SuXkiugCFMxbGNKTyTprYPfJz42wTOXbtd"
}
8 changes: 8 additions & 0 deletions tests/keys/jwk_ec_key_P-521.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
{
"kty": "EC",
"kid": "bilbo.baggins.521@hobbiton.example",
"crv": "P-521",
"x": "AHKZLLOsCOzz5cY97ewNUajB957y-C-U88c3v13nmGZx6sYl_oJXu9A5RkTKqjqvjyekWF-7ytDyRXYgCF5cj0Kt",
"y": "AdymlHvOiLxXkEhayXQnNCvDX4h9htZaCJN34kfmC6pV5OhQHiraVySsUdaQkAgDPrwQrJmbnX9cwlGfP-HqHZR1",
"d": "AAhRON2r9cqXX1hg-RoI6R1tX5p2rUAYdmpHZoC1XNM56KtscrX6zbKipQrCW9CGZH3T4ubpnoTKLDYJ_fF3_rJt"
}
8 changes: 0 additions & 8 deletions tests/keys/jwk_ec_pub.json

This file was deleted.

7 changes: 7 additions & 0 deletions tests/keys/jwk_ec_pub_P-256.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
{
"kty": "EC",
"kid": "bilbo.baggins.256@hobbiton.example",
"crv": "P-256",
"x": "PTTjIY84aLtaZCxLTrG_d8I0G6YKCV7lg8M4xkKfwQ4=",
"y": "ank6KA34vv24HZLXlChVs85NEGlpg2sbqNmR_BcgyJU="
}
7 changes: 7 additions & 0 deletions tests/keys/jwk_ec_pub_P-384.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
{
"kty": "EC",
"kid": "bilbo.baggins.384@hobbiton.example",
"crv": "P-384",
"x": "IDC-5s6FERlbC4Nc_4JhKW8sd51AhixtMdNUtPxhRFP323QY6cwWeIA3leyZhz-J",
"y": "eovmN9ocANS8IJxDAGSuC1FehTq5ZFLJU7XSPg36zHpv4H2byKGEcCBiwT4sFJsy"
}
7 changes: 7 additions & 0 deletions tests/keys/jwk_ec_pub_P-521.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
{
"kty": "EC",
"kid": "bilbo.baggins.521@hobbiton.example",
"crv": "P-521",
"x": "AHKZLLOsCOzz5cY97ewNUajB957y-C-U88c3v13nmGZx6sYl_oJXu9A5RkTKqjqvjyekWF-7ytDyRXYgCF5cj0Kt",
"y": "AdymlHvOiLxXkEhayXQnNCvDX4h9htZaCJN34kfmC6pV5OhQHiraVySsUdaQkAgDPrwQrJmbnX9cwlGfP-HqHZR1"
}
92 changes: 90 additions & 2 deletions tests/test_algorithms.py
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
RSAPSSAlgorithm,
Ed25519Algorithm,
)
from .keys import load_rsa_pub_key, load_ec_pub_key
from .keys import load_rsa_pub_key, load_ec_pub_key_p_521

has_crypto = True
except ImportError:
Expand Down Expand Up @@ -195,6 +195,94 @@ def test_rsa_verify_should_return_false_if_signature_invalid(self):
result = algo.verify(message, pub_key, sig)
assert not result

@pytest.mark.skipif(
not has_crypto, reason="Not supported without cryptography library"
)
def test_ec_jwk_public_and_private_keys_should_parse_and_verify(self):
tests = {
"P-256": ECAlgorithm.SHA256,
"P-384": ECAlgorithm.SHA384,
"P-521": ECAlgorithm.SHA512,
}
for (curve, hash) in tests.items():
algo = ECAlgorithm(hash)

with open(
key_path("jwk_ec_pub_{}.json".format(curve)), "r"
) as keyfile:
pub_key = algo.from_jwk(keyfile.read())

with open(
key_path("jwk_ec_key_{}.json".format(curve)), "r"
) as keyfile:
priv_key = algo.from_jwk(keyfile.read())

signature = algo.sign(force_bytes("Hello World!"), priv_key)
assert algo.verify(force_bytes("Hello World!"), pub_key, signature)

@pytest.mark.skipif(
not has_crypto, reason="Not supported without cryptography library"
)
def test_ec_jwk_fails_on_invalid_json(self):
algo = ECAlgorithm(ECAlgorithm.SHA512)

valid_points = {
"P-256": {
"x": "PTTjIY84aLtaZCxLTrG_d8I0G6YKCV7lg8M4xkKfwQ4=",
"y": "ank6KA34vv24HZLXlChVs85NEGlpg2sbqNmR_BcgyJU=",
},
"P-384": {
"x": "IDC-5s6FERlbC4Nc_4JhKW8sd51AhixtMdNUtPxhRFP323QY6cwWeIA3leyZhz-J",
"y": "eovmN9ocANS8IJxDAGSuC1FehTq5ZFLJU7XSPg36zHpv4H2byKGEcCBiwT4sFJsy",
},
"P-521": {
"x": "AHKZLLOsCOzz5cY97ewNUajB957y-C-U88c3v13nmGZx6sYl_oJXu9A5RkTKqjqvjyekWF-7ytDyRXYgCF5cj0Kt",
"y": "AdymlHvOiLxXkEhayXQnNCvDX4h9htZaCJN34kfmC6pV5OhQHiraVySsUdaQkAgDPrwQrJmbnX9cwlGfP-HqHZR1",
},
}

# Invalid JSON
with pytest.raises(InvalidKeyError):
algo.from_jwk("<this isn't json>")

# Bad key type
with pytest.raises(InvalidKeyError):
algo.from_jwk('{"kty": "RSA"}')

# Missing data
with pytest.raises(InvalidKeyError):
algo.from_jwk('{"kty": "EC"}')
with pytest.raises(InvalidKeyError):
algo.from_jwk('{"kty": "EC", "x": "1"}')
with pytest.raises(InvalidKeyError):
algo.from_jwk('{"kty": "EC", "y": "1"}')

# Missing curve
with pytest.raises(InvalidKeyError):
algo.from_jwk('{"kty": "EC", "x": "dGVzdA==", "y": "dGVzdA=="}')

# EC coordinates not equally long
with pytest.raises(InvalidKeyError):
algo.from_jwk(
'{"kty": "EC", "x": "dGVzdHRlc3Q=", "y": "dGVzdA=="}'
)

# EC coordinates length invalid
for curve in ("P-256", "P-384", "P-521"):
with pytest.raises(InvalidKeyError):
algo.from_jwk(
'{{"kty": "EC", "crv": "{}", "x": "dGVzdA==", '
'"y": "dGVzdA=="}}'.format(curve)
)

# EC private key length invalid
for (curve, point) in valid_points.items():
with pytest.raises(InvalidKeyError):
algo.from_jwk(
'{{"kty": "EC", "crv": "{}", "x": "{}", "y": "{}", '
'"d": "dGVzdA=="}}'.format(curve, point["x"], point["y"])
)

@pytest.mark.skipif(
not has_crypto, reason="Not supported without cryptography library"
)
Expand Down Expand Up @@ -670,7 +758,7 @@ def test_ec_verify_should_return_true_for_test_vector(self):
)

algo = ECAlgorithm(ECAlgorithm.SHA512)
key = algo.prepare_key(load_ec_pub_key())
key = algo.prepare_key(load_ec_pub_key_p_521())

result = algo.verify(signing_input, key, signature)
assert result
Expand Down