okp_gen.go 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116
  1. // This file is auto-generated by jwk/internal/cmd/genheader/main.go. DO NOT EDIT
  2. package jwk
  3. import (
  4. "bytes"
  5. "context"
  6. "crypto/x509"
  7. "fmt"
  8. "sort"
  9. "sync"
  10. "github.com/lestrrat-go/iter/mapiter"
  11. "github.com/lestrrat-go/jwx/internal/base64"
  12. "github.com/lestrrat-go/jwx/internal/iter"
  13. "github.com/lestrrat-go/jwx/internal/json"
  14. "github.com/lestrrat-go/jwx/internal/pool"
  15. "github.com/lestrrat-go/jwx/jwa"
  16. "github.com/pkg/errors"
  17. )
  18. const (
  19. OKPCrvKey = "crv"
  20. OKPDKey = "d"
  21. OKPXKey = "x"
  22. )
  23. type OKPPublicKey interface {
  24. Key
  25. FromRaw(interface{}) error
  26. Crv() jwa.EllipticCurveAlgorithm
  27. X() []byte
  28. }
  29. type okpPublicKey struct {
  30. algorithm *string // https://tools.ietf.org/html/rfc7517#section-4.4
  31. crv *jwa.EllipticCurveAlgorithm
  32. keyID *string // https://tools.ietf.org/html/rfc7515#section-4.1.4
  33. keyOps *KeyOperationList // https://tools.ietf.org/html/rfc7517#section-4.3
  34. keyUsage *string // https://tools.ietf.org/html/rfc7517#section-4.2
  35. x []byte
  36. x509CertChain *CertificateChain // https://tools.ietf.org/html/rfc7515#section-4.1.6
  37. x509CertThumbprint *string // https://tools.ietf.org/html/rfc7515#section-4.1.7
  38. x509CertThumbprintS256 *string // https://tools.ietf.org/html/rfc7515#section-4.1.8
  39. x509URL *string // https://tools.ietf.org/html/rfc7515#section-4.1.5
  40. privateParams map[string]interface{}
  41. mu *sync.RWMutex
  42. dc json.DecodeCtx
  43. }
  44. func NewOKPPublicKey() OKPPublicKey {
  45. return newOKPPublicKey()
  46. }
  47. func newOKPPublicKey() *okpPublicKey {
  48. return &okpPublicKey{
  49. mu: &sync.RWMutex{},
  50. privateParams: make(map[string]interface{}),
  51. }
  52. }
  53. func (h okpPublicKey) KeyType() jwa.KeyType {
  54. return jwa.OKP
  55. }
  56. func (h *okpPublicKey) Algorithm() string {
  57. if h.algorithm != nil {
  58. return *(h.algorithm)
  59. }
  60. return ""
  61. }
  62. func (h *okpPublicKey) Crv() jwa.EllipticCurveAlgorithm {
  63. if h.crv != nil {
  64. return *(h.crv)
  65. }
  66. return jwa.InvalidEllipticCurve
  67. }
  68. func (h *okpPublicKey) KeyID() string {
  69. if h.keyID != nil {
  70. return *(h.keyID)
  71. }
  72. return ""
  73. }
  74. func (h *okpPublicKey) KeyOps() KeyOperationList {
  75. if h.keyOps != nil {
  76. return *(h.keyOps)
  77. }
  78. return nil
  79. }
  80. func (h *okpPublicKey) KeyUsage() string {
  81. if h.keyUsage != nil {
  82. return *(h.keyUsage)
  83. }
  84. return ""
  85. }
  86. func (h *okpPublicKey) X() []byte {
  87. return h.x
  88. }
  89. func (h *okpPublicKey) X509CertChain() []*x509.Certificate {
  90. if h.x509CertChain != nil {
  91. return h.x509CertChain.Get()
  92. }
  93. return nil
  94. }
  95. func (h *okpPublicKey) X509CertThumbprint() string {
  96. if h.x509CertThumbprint != nil {
  97. return *(h.x509CertThumbprint)
  98. }
  99. return ""
  100. }
  101. func (h *okpPublicKey) X509CertThumbprintS256() string {
  102. if h.x509CertThumbprintS256 != nil {
  103. return *(h.x509CertThumbprintS256)
  104. }
  105. return ""
  106. }
  107. func (h *okpPublicKey) X509URL() string {
  108. if h.x509URL != nil {
  109. return *(h.x509URL)
  110. }
  111. return ""
  112. }
  113. func (h *okpPublicKey) makePairs() []*HeaderPair {
  114. h.mu.RLock()
  115. defer h.mu.RUnlock()
  116. var pairs []*HeaderPair
  117. pairs = append(pairs, &HeaderPair{Key: "kty", Value: jwa.OKP})
  118. if h.algorithm != nil {
  119. pairs = append(pairs, &HeaderPair{Key: AlgorithmKey, Value: *(h.algorithm)})
  120. }
  121. if h.crv != nil {
  122. pairs = append(pairs, &HeaderPair{Key: OKPCrvKey, Value: *(h.crv)})
  123. }
  124. if h.keyID != nil {
  125. pairs = append(pairs, &HeaderPair{Key: KeyIDKey, Value: *(h.keyID)})
  126. }
  127. if h.keyOps != nil {
  128. pairs = append(pairs, &HeaderPair{Key: KeyOpsKey, Value: *(h.keyOps)})
  129. }
  130. if h.keyUsage != nil {
  131. pairs = append(pairs, &HeaderPair{Key: KeyUsageKey, Value: *(h.keyUsage)})
  132. }
  133. if h.x != nil {
  134. pairs = append(pairs, &HeaderPair{Key: OKPXKey, Value: h.x})
  135. }
  136. if h.x509CertChain != nil {
  137. pairs = append(pairs, &HeaderPair{Key: X509CertChainKey, Value: *(h.x509CertChain)})
  138. }
  139. if h.x509CertThumbprint != nil {
  140. pairs = append(pairs, &HeaderPair{Key: X509CertThumbprintKey, Value: *(h.x509CertThumbprint)})
  141. }
  142. if h.x509CertThumbprintS256 != nil {
  143. pairs = append(pairs, &HeaderPair{Key: X509CertThumbprintS256Key, Value: *(h.x509CertThumbprintS256)})
  144. }
  145. if h.x509URL != nil {
  146. pairs = append(pairs, &HeaderPair{Key: X509URLKey, Value: *(h.x509URL)})
  147. }
  148. for k, v := range h.privateParams {
  149. pairs = append(pairs, &HeaderPair{Key: k, Value: v})
  150. }
  151. return pairs
  152. }
  153. func (h *okpPublicKey) PrivateParams() map[string]interface{} {
  154. return h.privateParams
  155. }
  156. func (h *okpPublicKey) Get(name string) (interface{}, bool) {
  157. h.mu.RLock()
  158. defer h.mu.RUnlock()
  159. switch name {
  160. case KeyTypeKey:
  161. return h.KeyType(), true
  162. case AlgorithmKey:
  163. if h.algorithm == nil {
  164. return nil, false
  165. }
  166. return *(h.algorithm), true
  167. case OKPCrvKey:
  168. if h.crv == nil {
  169. return nil, false
  170. }
  171. return *(h.crv), true
  172. case KeyIDKey:
  173. if h.keyID == nil {
  174. return nil, false
  175. }
  176. return *(h.keyID), true
  177. case KeyOpsKey:
  178. if h.keyOps == nil {
  179. return nil, false
  180. }
  181. return *(h.keyOps), true
  182. case KeyUsageKey:
  183. if h.keyUsage == nil {
  184. return nil, false
  185. }
  186. return *(h.keyUsage), true
  187. case OKPXKey:
  188. if h.x == nil {
  189. return nil, false
  190. }
  191. return h.x, true
  192. case X509CertChainKey:
  193. if h.x509CertChain == nil {
  194. return nil, false
  195. }
  196. return h.x509CertChain.Get(), true
  197. case X509CertThumbprintKey:
  198. if h.x509CertThumbprint == nil {
  199. return nil, false
  200. }
  201. return *(h.x509CertThumbprint), true
  202. case X509CertThumbprintS256Key:
  203. if h.x509CertThumbprintS256 == nil {
  204. return nil, false
  205. }
  206. return *(h.x509CertThumbprintS256), true
  207. case X509URLKey:
  208. if h.x509URL == nil {
  209. return nil, false
  210. }
  211. return *(h.x509URL), true
  212. default:
  213. v, ok := h.privateParams[name]
  214. return v, ok
  215. }
  216. }
  217. func (h *okpPublicKey) Set(name string, value interface{}) error {
  218. h.mu.Lock()
  219. defer h.mu.Unlock()
  220. return h.setNoLock(name, value)
  221. }
  222. func (h *okpPublicKey) setNoLock(name string, value interface{}) error {
  223. switch name {
  224. case "kty":
  225. return nil
  226. case AlgorithmKey:
  227. switch v := value.(type) {
  228. case string:
  229. h.algorithm = &v
  230. case fmt.Stringer:
  231. tmp := v.String()
  232. h.algorithm = &tmp
  233. default:
  234. return errors.Errorf(`invalid type for %s key: %T`, AlgorithmKey, value)
  235. }
  236. return nil
  237. case OKPCrvKey:
  238. if v, ok := value.(jwa.EllipticCurveAlgorithm); ok {
  239. h.crv = &v
  240. return nil
  241. }
  242. return errors.Errorf(`invalid value for %s key: %T`, OKPCrvKey, value)
  243. case KeyIDKey:
  244. if v, ok := value.(string); ok {
  245. h.keyID = &v
  246. return nil
  247. }
  248. return errors.Errorf(`invalid value for %s key: %T`, KeyIDKey, value)
  249. case KeyOpsKey:
  250. var acceptor KeyOperationList
  251. if err := acceptor.Accept(value); err != nil {
  252. return errors.Wrapf(err, `invalid value for %s key`, KeyOpsKey)
  253. }
  254. h.keyOps = &acceptor
  255. return nil
  256. case KeyUsageKey:
  257. switch v := value.(type) {
  258. case KeyUsageType:
  259. switch v {
  260. case ForSignature, ForEncryption:
  261. tmp := v.String()
  262. h.keyUsage = &tmp
  263. default:
  264. return errors.Errorf(`invalid key usage type %s`, v)
  265. }
  266. case string:
  267. h.keyUsage = &v
  268. default:
  269. return errors.Errorf(`invalid key usage type %s`, v)
  270. }
  271. case OKPXKey:
  272. if v, ok := value.([]byte); ok {
  273. h.x = v
  274. return nil
  275. }
  276. return errors.Errorf(`invalid value for %s key: %T`, OKPXKey, value)
  277. case X509CertChainKey:
  278. var acceptor CertificateChain
  279. if err := acceptor.Accept(value); err != nil {
  280. return errors.Wrapf(err, `invalid value for %s key`, X509CertChainKey)
  281. }
  282. h.x509CertChain = &acceptor
  283. return nil
  284. case X509CertThumbprintKey:
  285. if v, ok := value.(string); ok {
  286. h.x509CertThumbprint = &v
  287. return nil
  288. }
  289. return errors.Errorf(`invalid value for %s key: %T`, X509CertThumbprintKey, value)
  290. case X509CertThumbprintS256Key:
  291. if v, ok := value.(string); ok {
  292. h.x509CertThumbprintS256 = &v
  293. return nil
  294. }
  295. return errors.Errorf(`invalid value for %s key: %T`, X509CertThumbprintS256Key, value)
  296. case X509URLKey:
  297. if v, ok := value.(string); ok {
  298. h.x509URL = &v
  299. return nil
  300. }
  301. return errors.Errorf(`invalid value for %s key: %T`, X509URLKey, value)
  302. default:
  303. if h.privateParams == nil {
  304. h.privateParams = map[string]interface{}{}
  305. }
  306. h.privateParams[name] = value
  307. }
  308. return nil
  309. }
  310. func (k *okpPublicKey) Remove(key string) error {
  311. k.mu.Lock()
  312. defer k.mu.Unlock()
  313. switch key {
  314. case AlgorithmKey:
  315. k.algorithm = nil
  316. case OKPCrvKey:
  317. k.crv = nil
  318. case KeyIDKey:
  319. k.keyID = nil
  320. case KeyOpsKey:
  321. k.keyOps = nil
  322. case KeyUsageKey:
  323. k.keyUsage = nil
  324. case OKPXKey:
  325. k.x = nil
  326. case X509CertChainKey:
  327. k.x509CertChain = nil
  328. case X509CertThumbprintKey:
  329. k.x509CertThumbprint = nil
  330. case X509CertThumbprintS256Key:
  331. k.x509CertThumbprintS256 = nil
  332. case X509URLKey:
  333. k.x509URL = nil
  334. default:
  335. delete(k.privateParams, key)
  336. }
  337. return nil
  338. }
  339. func (k *okpPublicKey) Clone() (Key, error) {
  340. return cloneKey(k)
  341. }
  342. func (k *okpPublicKey) DecodeCtx() json.DecodeCtx {
  343. k.mu.RLock()
  344. defer k.mu.RUnlock()
  345. return k.dc
  346. }
  347. func (k *okpPublicKey) SetDecodeCtx(dc json.DecodeCtx) {
  348. k.mu.Lock()
  349. defer k.mu.Unlock()
  350. k.dc = dc
  351. }
  352. func (h *okpPublicKey) UnmarshalJSON(buf []byte) error {
  353. h.algorithm = nil
  354. h.crv = nil
  355. h.keyID = nil
  356. h.keyOps = nil
  357. h.keyUsage = nil
  358. h.x = nil
  359. h.x509CertChain = nil
  360. h.x509CertThumbprint = nil
  361. h.x509CertThumbprintS256 = nil
  362. h.x509URL = nil
  363. dec := json.NewDecoder(bytes.NewReader(buf))
  364. LOOP:
  365. for {
  366. tok, err := dec.Token()
  367. if err != nil {
  368. return errors.Wrap(err, `error reading token`)
  369. }
  370. switch tok := tok.(type) {
  371. case json.Delim:
  372. // Assuming we're doing everything correctly, we should ONLY
  373. // get either '{' or '}' here.
  374. if tok == '}' { // End of object
  375. break LOOP
  376. } else if tok != '{' {
  377. return errors.Errorf(`expected '{', but got '%c'`, tok)
  378. }
  379. case string: // Objects can only have string keys
  380. switch tok {
  381. case KeyTypeKey:
  382. val, err := json.ReadNextStringToken(dec)
  383. if err != nil {
  384. return errors.Wrap(err, `error reading token`)
  385. }
  386. if val != jwa.OKP.String() {
  387. return errors.Errorf(`invalid kty value for RSAPublicKey (%s)`, val)
  388. }
  389. case AlgorithmKey:
  390. if err := json.AssignNextStringToken(&h.algorithm, dec); err != nil {
  391. return errors.Wrapf(err, `failed to decode value for key %s`, AlgorithmKey)
  392. }
  393. case OKPCrvKey:
  394. var decoded jwa.EllipticCurveAlgorithm
  395. if err := dec.Decode(&decoded); err != nil {
  396. return errors.Wrapf(err, `failed to decode value for key %s`, OKPCrvKey)
  397. }
  398. h.crv = &decoded
  399. case KeyIDKey:
  400. if err := json.AssignNextStringToken(&h.keyID, dec); err != nil {
  401. return errors.Wrapf(err, `failed to decode value for key %s`, KeyIDKey)
  402. }
  403. case KeyOpsKey:
  404. var decoded KeyOperationList
  405. if err := dec.Decode(&decoded); err != nil {
  406. return errors.Wrapf(err, `failed to decode value for key %s`, KeyOpsKey)
  407. }
  408. h.keyOps = &decoded
  409. case KeyUsageKey:
  410. if err := json.AssignNextStringToken(&h.keyUsage, dec); err != nil {
  411. return errors.Wrapf(err, `failed to decode value for key %s`, KeyUsageKey)
  412. }
  413. case OKPXKey:
  414. if err := json.AssignNextBytesToken(&h.x, dec); err != nil {
  415. return errors.Wrapf(err, `failed to decode value for key %s`, OKPXKey)
  416. }
  417. case X509CertChainKey:
  418. var decoded CertificateChain
  419. if err := dec.Decode(&decoded); err != nil {
  420. return errors.Wrapf(err, `failed to decode value for key %s`, X509CertChainKey)
  421. }
  422. h.x509CertChain = &decoded
  423. case X509CertThumbprintKey:
  424. if err := json.AssignNextStringToken(&h.x509CertThumbprint, dec); err != nil {
  425. return errors.Wrapf(err, `failed to decode value for key %s`, X509CertThumbprintKey)
  426. }
  427. case X509CertThumbprintS256Key:
  428. if err := json.AssignNextStringToken(&h.x509CertThumbprintS256, dec); err != nil {
  429. return errors.Wrapf(err, `failed to decode value for key %s`, X509CertThumbprintS256Key)
  430. }
  431. case X509URLKey:
  432. if err := json.AssignNextStringToken(&h.x509URL, dec); err != nil {
  433. return errors.Wrapf(err, `failed to decode value for key %s`, X509URLKey)
  434. }
  435. default:
  436. if dc := h.dc; dc != nil {
  437. if localReg := dc.Registry(); localReg != nil {
  438. decoded, err := localReg.Decode(dec, tok)
  439. if err == nil {
  440. h.setNoLock(tok, decoded)
  441. continue
  442. }
  443. }
  444. }
  445. decoded, err := registry.Decode(dec, tok)
  446. if err == nil {
  447. h.setNoLock(tok, decoded)
  448. continue
  449. }
  450. return errors.Wrapf(err, `could not decode field %s`, tok)
  451. }
  452. default:
  453. return errors.Errorf(`invalid token %T`, tok)
  454. }
  455. }
  456. if h.crv == nil {
  457. return errors.Errorf(`required field crv is missing`)
  458. }
  459. if h.x == nil {
  460. return errors.Errorf(`required field x is missing`)
  461. }
  462. return nil
  463. }
  464. func (h okpPublicKey) MarshalJSON() ([]byte, error) {
  465. data := make(map[string]interface{})
  466. fields := make([]string, 0, 10)
  467. for _, pair := range h.makePairs() {
  468. fields = append(fields, pair.Key.(string))
  469. data[pair.Key.(string)] = pair.Value
  470. }
  471. sort.Strings(fields)
  472. buf := pool.GetBytesBuffer()
  473. defer pool.ReleaseBytesBuffer(buf)
  474. buf.WriteByte('{')
  475. enc := json.NewEncoder(buf)
  476. for i, f := range fields {
  477. if i > 0 {
  478. buf.WriteRune(',')
  479. }
  480. buf.WriteRune('"')
  481. buf.WriteString(f)
  482. buf.WriteString(`":`)
  483. v := data[f]
  484. switch v := v.(type) {
  485. case []byte:
  486. buf.WriteRune('"')
  487. buf.WriteString(base64.EncodeToString(v))
  488. buf.WriteRune('"')
  489. default:
  490. if err := enc.Encode(v); err != nil {
  491. return nil, errors.Wrapf(err, `failed to encode value for field %s`, f)
  492. }
  493. buf.Truncate(buf.Len() - 1)
  494. }
  495. }
  496. buf.WriteByte('}')
  497. ret := make([]byte, buf.Len())
  498. copy(ret, buf.Bytes())
  499. return ret, nil
  500. }
  501. func (h *okpPublicKey) Iterate(ctx context.Context) HeaderIterator {
  502. pairs := h.makePairs()
  503. ch := make(chan *HeaderPair, len(pairs))
  504. go func(ctx context.Context, ch chan *HeaderPair, pairs []*HeaderPair) {
  505. defer close(ch)
  506. for _, pair := range pairs {
  507. select {
  508. case <-ctx.Done():
  509. return
  510. case ch <- pair:
  511. }
  512. }
  513. }(ctx, ch, pairs)
  514. return mapiter.New(ch)
  515. }
  516. func (h *okpPublicKey) Walk(ctx context.Context, visitor HeaderVisitor) error {
  517. return iter.WalkMap(ctx, h, visitor)
  518. }
  519. func (h *okpPublicKey) AsMap(ctx context.Context) (map[string]interface{}, error) {
  520. return iter.AsMap(ctx, h)
  521. }
  522. type OKPPrivateKey interface {
  523. Key
  524. FromRaw(interface{}) error
  525. Crv() jwa.EllipticCurveAlgorithm
  526. D() []byte
  527. X() []byte
  528. }
  529. type okpPrivateKey struct {
  530. algorithm *string // https://tools.ietf.org/html/rfc7517#section-4.4
  531. crv *jwa.EllipticCurveAlgorithm
  532. d []byte
  533. keyID *string // https://tools.ietf.org/html/rfc7515#section-4.1.4
  534. keyOps *KeyOperationList // https://tools.ietf.org/html/rfc7517#section-4.3
  535. keyUsage *string // https://tools.ietf.org/html/rfc7517#section-4.2
  536. x []byte
  537. x509CertChain *CertificateChain // https://tools.ietf.org/html/rfc7515#section-4.1.6
  538. x509CertThumbprint *string // https://tools.ietf.org/html/rfc7515#section-4.1.7
  539. x509CertThumbprintS256 *string // https://tools.ietf.org/html/rfc7515#section-4.1.8
  540. x509URL *string // https://tools.ietf.org/html/rfc7515#section-4.1.5
  541. privateParams map[string]interface{}
  542. mu *sync.RWMutex
  543. dc json.DecodeCtx
  544. }
  545. func NewOKPPrivateKey() OKPPrivateKey {
  546. return newOKPPrivateKey()
  547. }
  548. func newOKPPrivateKey() *okpPrivateKey {
  549. return &okpPrivateKey{
  550. mu: &sync.RWMutex{},
  551. privateParams: make(map[string]interface{}),
  552. }
  553. }
  554. func (h okpPrivateKey) KeyType() jwa.KeyType {
  555. return jwa.OKP
  556. }
  557. func (h *okpPrivateKey) Algorithm() string {
  558. if h.algorithm != nil {
  559. return *(h.algorithm)
  560. }
  561. return ""
  562. }
  563. func (h *okpPrivateKey) Crv() jwa.EllipticCurveAlgorithm {
  564. if h.crv != nil {
  565. return *(h.crv)
  566. }
  567. return jwa.InvalidEllipticCurve
  568. }
  569. func (h *okpPrivateKey) D() []byte {
  570. return h.d
  571. }
  572. func (h *okpPrivateKey) KeyID() string {
  573. if h.keyID != nil {
  574. return *(h.keyID)
  575. }
  576. return ""
  577. }
  578. func (h *okpPrivateKey) KeyOps() KeyOperationList {
  579. if h.keyOps != nil {
  580. return *(h.keyOps)
  581. }
  582. return nil
  583. }
  584. func (h *okpPrivateKey) KeyUsage() string {
  585. if h.keyUsage != nil {
  586. return *(h.keyUsage)
  587. }
  588. return ""
  589. }
  590. func (h *okpPrivateKey) X() []byte {
  591. return h.x
  592. }
  593. func (h *okpPrivateKey) X509CertChain() []*x509.Certificate {
  594. if h.x509CertChain != nil {
  595. return h.x509CertChain.Get()
  596. }
  597. return nil
  598. }
  599. func (h *okpPrivateKey) X509CertThumbprint() string {
  600. if h.x509CertThumbprint != nil {
  601. return *(h.x509CertThumbprint)
  602. }
  603. return ""
  604. }
  605. func (h *okpPrivateKey) X509CertThumbprintS256() string {
  606. if h.x509CertThumbprintS256 != nil {
  607. return *(h.x509CertThumbprintS256)
  608. }
  609. return ""
  610. }
  611. func (h *okpPrivateKey) X509URL() string {
  612. if h.x509URL != nil {
  613. return *(h.x509URL)
  614. }
  615. return ""
  616. }
  617. func (h *okpPrivateKey) makePairs() []*HeaderPair {
  618. h.mu.RLock()
  619. defer h.mu.RUnlock()
  620. var pairs []*HeaderPair
  621. pairs = append(pairs, &HeaderPair{Key: "kty", Value: jwa.OKP})
  622. if h.algorithm != nil {
  623. pairs = append(pairs, &HeaderPair{Key: AlgorithmKey, Value: *(h.algorithm)})
  624. }
  625. if h.crv != nil {
  626. pairs = append(pairs, &HeaderPair{Key: OKPCrvKey, Value: *(h.crv)})
  627. }
  628. if h.d != nil {
  629. pairs = append(pairs, &HeaderPair{Key: OKPDKey, Value: h.d})
  630. }
  631. if h.keyID != nil {
  632. pairs = append(pairs, &HeaderPair{Key: KeyIDKey, Value: *(h.keyID)})
  633. }
  634. if h.keyOps != nil {
  635. pairs = append(pairs, &HeaderPair{Key: KeyOpsKey, Value: *(h.keyOps)})
  636. }
  637. if h.keyUsage != nil {
  638. pairs = append(pairs, &HeaderPair{Key: KeyUsageKey, Value: *(h.keyUsage)})
  639. }
  640. if h.x != nil {
  641. pairs = append(pairs, &HeaderPair{Key: OKPXKey, Value: h.x})
  642. }
  643. if h.x509CertChain != nil {
  644. pairs = append(pairs, &HeaderPair{Key: X509CertChainKey, Value: *(h.x509CertChain)})
  645. }
  646. if h.x509CertThumbprint != nil {
  647. pairs = append(pairs, &HeaderPair{Key: X509CertThumbprintKey, Value: *(h.x509CertThumbprint)})
  648. }
  649. if h.x509CertThumbprintS256 != nil {
  650. pairs = append(pairs, &HeaderPair{Key: X509CertThumbprintS256Key, Value: *(h.x509CertThumbprintS256)})
  651. }
  652. if h.x509URL != nil {
  653. pairs = append(pairs, &HeaderPair{Key: X509URLKey, Value: *(h.x509URL)})
  654. }
  655. for k, v := range h.privateParams {
  656. pairs = append(pairs, &HeaderPair{Key: k, Value: v})
  657. }
  658. return pairs
  659. }
  660. func (h *okpPrivateKey) PrivateParams() map[string]interface{} {
  661. return h.privateParams
  662. }
  663. func (h *okpPrivateKey) Get(name string) (interface{}, bool) {
  664. h.mu.RLock()
  665. defer h.mu.RUnlock()
  666. switch name {
  667. case KeyTypeKey:
  668. return h.KeyType(), true
  669. case AlgorithmKey:
  670. if h.algorithm == nil {
  671. return nil, false
  672. }
  673. return *(h.algorithm), true
  674. case OKPCrvKey:
  675. if h.crv == nil {
  676. return nil, false
  677. }
  678. return *(h.crv), true
  679. case OKPDKey:
  680. if h.d == nil {
  681. return nil, false
  682. }
  683. return h.d, true
  684. case KeyIDKey:
  685. if h.keyID == nil {
  686. return nil, false
  687. }
  688. return *(h.keyID), true
  689. case KeyOpsKey:
  690. if h.keyOps == nil {
  691. return nil, false
  692. }
  693. return *(h.keyOps), true
  694. case KeyUsageKey:
  695. if h.keyUsage == nil {
  696. return nil, false
  697. }
  698. return *(h.keyUsage), true
  699. case OKPXKey:
  700. if h.x == nil {
  701. return nil, false
  702. }
  703. return h.x, true
  704. case X509CertChainKey:
  705. if h.x509CertChain == nil {
  706. return nil, false
  707. }
  708. return h.x509CertChain.Get(), true
  709. case X509CertThumbprintKey:
  710. if h.x509CertThumbprint == nil {
  711. return nil, false
  712. }
  713. return *(h.x509CertThumbprint), true
  714. case X509CertThumbprintS256Key:
  715. if h.x509CertThumbprintS256 == nil {
  716. return nil, false
  717. }
  718. return *(h.x509CertThumbprintS256), true
  719. case X509URLKey:
  720. if h.x509URL == nil {
  721. return nil, false
  722. }
  723. return *(h.x509URL), true
  724. default:
  725. v, ok := h.privateParams[name]
  726. return v, ok
  727. }
  728. }
  729. func (h *okpPrivateKey) Set(name string, value interface{}) error {
  730. h.mu.Lock()
  731. defer h.mu.Unlock()
  732. return h.setNoLock(name, value)
  733. }
  734. func (h *okpPrivateKey) setNoLock(name string, value interface{}) error {
  735. switch name {
  736. case "kty":
  737. return nil
  738. case AlgorithmKey:
  739. switch v := value.(type) {
  740. case string:
  741. h.algorithm = &v
  742. case fmt.Stringer:
  743. tmp := v.String()
  744. h.algorithm = &tmp
  745. default:
  746. return errors.Errorf(`invalid type for %s key: %T`, AlgorithmKey, value)
  747. }
  748. return nil
  749. case OKPCrvKey:
  750. if v, ok := value.(jwa.EllipticCurveAlgorithm); ok {
  751. h.crv = &v
  752. return nil
  753. }
  754. return errors.Errorf(`invalid value for %s key: %T`, OKPCrvKey, value)
  755. case OKPDKey:
  756. if v, ok := value.([]byte); ok {
  757. h.d = v
  758. return nil
  759. }
  760. return errors.Errorf(`invalid value for %s key: %T`, OKPDKey, value)
  761. case KeyIDKey:
  762. if v, ok := value.(string); ok {
  763. h.keyID = &v
  764. return nil
  765. }
  766. return errors.Errorf(`invalid value for %s key: %T`, KeyIDKey, value)
  767. case KeyOpsKey:
  768. var acceptor KeyOperationList
  769. if err := acceptor.Accept(value); err != nil {
  770. return errors.Wrapf(err, `invalid value for %s key`, KeyOpsKey)
  771. }
  772. h.keyOps = &acceptor
  773. return nil
  774. case KeyUsageKey:
  775. switch v := value.(type) {
  776. case KeyUsageType:
  777. switch v {
  778. case ForSignature, ForEncryption:
  779. tmp := v.String()
  780. h.keyUsage = &tmp
  781. default:
  782. return errors.Errorf(`invalid key usage type %s`, v)
  783. }
  784. case string:
  785. h.keyUsage = &v
  786. default:
  787. return errors.Errorf(`invalid key usage type %s`, v)
  788. }
  789. case OKPXKey:
  790. if v, ok := value.([]byte); ok {
  791. h.x = v
  792. return nil
  793. }
  794. return errors.Errorf(`invalid value for %s key: %T`, OKPXKey, value)
  795. case X509CertChainKey:
  796. var acceptor CertificateChain
  797. if err := acceptor.Accept(value); err != nil {
  798. return errors.Wrapf(err, `invalid value for %s key`, X509CertChainKey)
  799. }
  800. h.x509CertChain = &acceptor
  801. return nil
  802. case X509CertThumbprintKey:
  803. if v, ok := value.(string); ok {
  804. h.x509CertThumbprint = &v
  805. return nil
  806. }
  807. return errors.Errorf(`invalid value for %s key: %T`, X509CertThumbprintKey, value)
  808. case X509CertThumbprintS256Key:
  809. if v, ok := value.(string); ok {
  810. h.x509CertThumbprintS256 = &v
  811. return nil
  812. }
  813. return errors.Errorf(`invalid value for %s key: %T`, X509CertThumbprintS256Key, value)
  814. case X509URLKey:
  815. if v, ok := value.(string); ok {
  816. h.x509URL = &v
  817. return nil
  818. }
  819. return errors.Errorf(`invalid value for %s key: %T`, X509URLKey, value)
  820. default:
  821. if h.privateParams == nil {
  822. h.privateParams = map[string]interface{}{}
  823. }
  824. h.privateParams[name] = value
  825. }
  826. return nil
  827. }
  828. func (k *okpPrivateKey) Remove(key string) error {
  829. k.mu.Lock()
  830. defer k.mu.Unlock()
  831. switch key {
  832. case AlgorithmKey:
  833. k.algorithm = nil
  834. case OKPCrvKey:
  835. k.crv = nil
  836. case OKPDKey:
  837. k.d = nil
  838. case KeyIDKey:
  839. k.keyID = nil
  840. case KeyOpsKey:
  841. k.keyOps = nil
  842. case KeyUsageKey:
  843. k.keyUsage = nil
  844. case OKPXKey:
  845. k.x = nil
  846. case X509CertChainKey:
  847. k.x509CertChain = nil
  848. case X509CertThumbprintKey:
  849. k.x509CertThumbprint = nil
  850. case X509CertThumbprintS256Key:
  851. k.x509CertThumbprintS256 = nil
  852. case X509URLKey:
  853. k.x509URL = nil
  854. default:
  855. delete(k.privateParams, key)
  856. }
  857. return nil
  858. }
  859. func (k *okpPrivateKey) Clone() (Key, error) {
  860. return cloneKey(k)
  861. }
  862. func (k *okpPrivateKey) DecodeCtx() json.DecodeCtx {
  863. k.mu.RLock()
  864. defer k.mu.RUnlock()
  865. return k.dc
  866. }
  867. func (k *okpPrivateKey) SetDecodeCtx(dc json.DecodeCtx) {
  868. k.mu.Lock()
  869. defer k.mu.Unlock()
  870. k.dc = dc
  871. }
  872. func (h *okpPrivateKey) UnmarshalJSON(buf []byte) error {
  873. h.algorithm = nil
  874. h.crv = nil
  875. h.d = nil
  876. h.keyID = nil
  877. h.keyOps = nil
  878. h.keyUsage = nil
  879. h.x = nil
  880. h.x509CertChain = nil
  881. h.x509CertThumbprint = nil
  882. h.x509CertThumbprintS256 = nil
  883. h.x509URL = nil
  884. dec := json.NewDecoder(bytes.NewReader(buf))
  885. LOOP:
  886. for {
  887. tok, err := dec.Token()
  888. if err != nil {
  889. return errors.Wrap(err, `error reading token`)
  890. }
  891. switch tok := tok.(type) {
  892. case json.Delim:
  893. // Assuming we're doing everything correctly, we should ONLY
  894. // get either '{' or '}' here.
  895. if tok == '}' { // End of object
  896. break LOOP
  897. } else if tok != '{' {
  898. return errors.Errorf(`expected '{', but got '%c'`, tok)
  899. }
  900. case string: // Objects can only have string keys
  901. switch tok {
  902. case KeyTypeKey:
  903. val, err := json.ReadNextStringToken(dec)
  904. if err != nil {
  905. return errors.Wrap(err, `error reading token`)
  906. }
  907. if val != jwa.OKP.String() {
  908. return errors.Errorf(`invalid kty value for RSAPublicKey (%s)`, val)
  909. }
  910. case AlgorithmKey:
  911. if err := json.AssignNextStringToken(&h.algorithm, dec); err != nil {
  912. return errors.Wrapf(err, `failed to decode value for key %s`, AlgorithmKey)
  913. }
  914. case OKPCrvKey:
  915. var decoded jwa.EllipticCurveAlgorithm
  916. if err := dec.Decode(&decoded); err != nil {
  917. return errors.Wrapf(err, `failed to decode value for key %s`, OKPCrvKey)
  918. }
  919. h.crv = &decoded
  920. case OKPDKey:
  921. if err := json.AssignNextBytesToken(&h.d, dec); err != nil {
  922. return errors.Wrapf(err, `failed to decode value for key %s`, OKPDKey)
  923. }
  924. case KeyIDKey:
  925. if err := json.AssignNextStringToken(&h.keyID, dec); err != nil {
  926. return errors.Wrapf(err, `failed to decode value for key %s`, KeyIDKey)
  927. }
  928. case KeyOpsKey:
  929. var decoded KeyOperationList
  930. if err := dec.Decode(&decoded); err != nil {
  931. return errors.Wrapf(err, `failed to decode value for key %s`, KeyOpsKey)
  932. }
  933. h.keyOps = &decoded
  934. case KeyUsageKey:
  935. if err := json.AssignNextStringToken(&h.keyUsage, dec); err != nil {
  936. return errors.Wrapf(err, `failed to decode value for key %s`, KeyUsageKey)
  937. }
  938. case OKPXKey:
  939. if err := json.AssignNextBytesToken(&h.x, dec); err != nil {
  940. return errors.Wrapf(err, `failed to decode value for key %s`, OKPXKey)
  941. }
  942. case X509CertChainKey:
  943. var decoded CertificateChain
  944. if err := dec.Decode(&decoded); err != nil {
  945. return errors.Wrapf(err, `failed to decode value for key %s`, X509CertChainKey)
  946. }
  947. h.x509CertChain = &decoded
  948. case X509CertThumbprintKey:
  949. if err := json.AssignNextStringToken(&h.x509CertThumbprint, dec); err != nil {
  950. return errors.Wrapf(err, `failed to decode value for key %s`, X509CertThumbprintKey)
  951. }
  952. case X509CertThumbprintS256Key:
  953. if err := json.AssignNextStringToken(&h.x509CertThumbprintS256, dec); err != nil {
  954. return errors.Wrapf(err, `failed to decode value for key %s`, X509CertThumbprintS256Key)
  955. }
  956. case X509URLKey:
  957. if err := json.AssignNextStringToken(&h.x509URL, dec); err != nil {
  958. return errors.Wrapf(err, `failed to decode value for key %s`, X509URLKey)
  959. }
  960. default:
  961. if dc := h.dc; dc != nil {
  962. if localReg := dc.Registry(); localReg != nil {
  963. decoded, err := localReg.Decode(dec, tok)
  964. if err == nil {
  965. h.setNoLock(tok, decoded)
  966. continue
  967. }
  968. }
  969. }
  970. decoded, err := registry.Decode(dec, tok)
  971. if err == nil {
  972. h.setNoLock(tok, decoded)
  973. continue
  974. }
  975. return errors.Wrapf(err, `could not decode field %s`, tok)
  976. }
  977. default:
  978. return errors.Errorf(`invalid token %T`, tok)
  979. }
  980. }
  981. if h.crv == nil {
  982. return errors.Errorf(`required field crv is missing`)
  983. }
  984. if h.d == nil {
  985. return errors.Errorf(`required field d is missing`)
  986. }
  987. if h.x == nil {
  988. return errors.Errorf(`required field x is missing`)
  989. }
  990. return nil
  991. }
  992. func (h okpPrivateKey) MarshalJSON() ([]byte, error) {
  993. data := make(map[string]interface{})
  994. fields := make([]string, 0, 11)
  995. for _, pair := range h.makePairs() {
  996. fields = append(fields, pair.Key.(string))
  997. data[pair.Key.(string)] = pair.Value
  998. }
  999. sort.Strings(fields)
  1000. buf := pool.GetBytesBuffer()
  1001. defer pool.ReleaseBytesBuffer(buf)
  1002. buf.WriteByte('{')
  1003. enc := json.NewEncoder(buf)
  1004. for i, f := range fields {
  1005. if i > 0 {
  1006. buf.WriteRune(',')
  1007. }
  1008. buf.WriteRune('"')
  1009. buf.WriteString(f)
  1010. buf.WriteString(`":`)
  1011. v := data[f]
  1012. switch v := v.(type) {
  1013. case []byte:
  1014. buf.WriteRune('"')
  1015. buf.WriteString(base64.EncodeToString(v))
  1016. buf.WriteRune('"')
  1017. default:
  1018. if err := enc.Encode(v); err != nil {
  1019. return nil, errors.Wrapf(err, `failed to encode value for field %s`, f)
  1020. }
  1021. buf.Truncate(buf.Len() - 1)
  1022. }
  1023. }
  1024. buf.WriteByte('}')
  1025. ret := make([]byte, buf.Len())
  1026. copy(ret, buf.Bytes())
  1027. return ret, nil
  1028. }
  1029. func (h *okpPrivateKey) Iterate(ctx context.Context) HeaderIterator {
  1030. pairs := h.makePairs()
  1031. ch := make(chan *HeaderPair, len(pairs))
  1032. go func(ctx context.Context, ch chan *HeaderPair, pairs []*HeaderPair) {
  1033. defer close(ch)
  1034. for _, pair := range pairs {
  1035. select {
  1036. case <-ctx.Done():
  1037. return
  1038. case ch <- pair:
  1039. }
  1040. }
  1041. }(ctx, ch, pairs)
  1042. return mapiter.New(ch)
  1043. }
  1044. func (h *okpPrivateKey) Walk(ctx context.Context, visitor HeaderVisitor) error {
  1045. return iter.WalkMap(ctx, h, visitor)
  1046. }
  1047. func (h *okpPrivateKey) AsMap(ctx context.Context) (map[string]interface{}, error) {
  1048. return iter.AsMap(ctx, h)
  1049. }