ecdsa_gen.go 30 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178
  1. // This file is auto-generated by jwk/internal/cmd/genheader/main.go. DO NOT EDIT
  2. package jwk
  3. import (
  4. "bytes"
  5. "context"
  6. "crypto/ecdsa"
  7. "crypto/x509"
  8. "fmt"
  9. "sort"
  10. "sync"
  11. "github.com/lestrrat-go/iter/mapiter"
  12. "github.com/lestrrat-go/jwx/internal/base64"
  13. "github.com/lestrrat-go/jwx/internal/iter"
  14. "github.com/lestrrat-go/jwx/internal/json"
  15. "github.com/lestrrat-go/jwx/internal/pool"
  16. "github.com/lestrrat-go/jwx/jwa"
  17. "github.com/pkg/errors"
  18. )
  19. const (
  20. ECDSACrvKey = "crv"
  21. ECDSADKey = "d"
  22. ECDSAXKey = "x"
  23. ECDSAYKey = "y"
  24. )
  25. type ECDSAPublicKey interface {
  26. Key
  27. FromRaw(*ecdsa.PublicKey) error
  28. Crv() jwa.EllipticCurveAlgorithm
  29. X() []byte
  30. Y() []byte
  31. }
  32. type ecdsaPublicKey struct {
  33. algorithm *string // https://tools.ietf.org/html/rfc7517#section-4.4
  34. crv *jwa.EllipticCurveAlgorithm
  35. keyID *string // https://tools.ietf.org/html/rfc7515#section-4.1.4
  36. keyOps *KeyOperationList // https://tools.ietf.org/html/rfc7517#section-4.3
  37. keyUsage *string // https://tools.ietf.org/html/rfc7517#section-4.2
  38. x []byte
  39. x509CertChain *CertificateChain // https://tools.ietf.org/html/rfc7515#section-4.1.6
  40. x509CertThumbprint *string // https://tools.ietf.org/html/rfc7515#section-4.1.7
  41. x509CertThumbprintS256 *string // https://tools.ietf.org/html/rfc7515#section-4.1.8
  42. x509URL *string // https://tools.ietf.org/html/rfc7515#section-4.1.5
  43. y []byte
  44. privateParams map[string]interface{}
  45. mu *sync.RWMutex
  46. dc json.DecodeCtx
  47. }
  48. func NewECDSAPublicKey() ECDSAPublicKey {
  49. return newECDSAPublicKey()
  50. }
  51. func newECDSAPublicKey() *ecdsaPublicKey {
  52. return &ecdsaPublicKey{
  53. mu: &sync.RWMutex{},
  54. privateParams: make(map[string]interface{}),
  55. }
  56. }
  57. func (h ecdsaPublicKey) KeyType() jwa.KeyType {
  58. return jwa.EC
  59. }
  60. func (h *ecdsaPublicKey) Algorithm() string {
  61. if h.algorithm != nil {
  62. return *(h.algorithm)
  63. }
  64. return ""
  65. }
  66. func (h *ecdsaPublicKey) Crv() jwa.EllipticCurveAlgorithm {
  67. if h.crv != nil {
  68. return *(h.crv)
  69. }
  70. return jwa.InvalidEllipticCurve
  71. }
  72. func (h *ecdsaPublicKey) KeyID() string {
  73. if h.keyID != nil {
  74. return *(h.keyID)
  75. }
  76. return ""
  77. }
  78. func (h *ecdsaPublicKey) KeyOps() KeyOperationList {
  79. if h.keyOps != nil {
  80. return *(h.keyOps)
  81. }
  82. return nil
  83. }
  84. func (h *ecdsaPublicKey) KeyUsage() string {
  85. if h.keyUsage != nil {
  86. return *(h.keyUsage)
  87. }
  88. return ""
  89. }
  90. func (h *ecdsaPublicKey) X() []byte {
  91. return h.x
  92. }
  93. func (h *ecdsaPublicKey) X509CertChain() []*x509.Certificate {
  94. if h.x509CertChain != nil {
  95. return h.x509CertChain.Get()
  96. }
  97. return nil
  98. }
  99. func (h *ecdsaPublicKey) X509CertThumbprint() string {
  100. if h.x509CertThumbprint != nil {
  101. return *(h.x509CertThumbprint)
  102. }
  103. return ""
  104. }
  105. func (h *ecdsaPublicKey) X509CertThumbprintS256() string {
  106. if h.x509CertThumbprintS256 != nil {
  107. return *(h.x509CertThumbprintS256)
  108. }
  109. return ""
  110. }
  111. func (h *ecdsaPublicKey) X509URL() string {
  112. if h.x509URL != nil {
  113. return *(h.x509URL)
  114. }
  115. return ""
  116. }
  117. func (h *ecdsaPublicKey) Y() []byte {
  118. return h.y
  119. }
  120. func (h *ecdsaPublicKey) makePairs() []*HeaderPair {
  121. h.mu.RLock()
  122. defer h.mu.RUnlock()
  123. var pairs []*HeaderPair
  124. pairs = append(pairs, &HeaderPair{Key: "kty", Value: jwa.EC})
  125. if h.algorithm != nil {
  126. pairs = append(pairs, &HeaderPair{Key: AlgorithmKey, Value: *(h.algorithm)})
  127. }
  128. if h.crv != nil {
  129. pairs = append(pairs, &HeaderPair{Key: ECDSACrvKey, Value: *(h.crv)})
  130. }
  131. if h.keyID != nil {
  132. pairs = append(pairs, &HeaderPair{Key: KeyIDKey, Value: *(h.keyID)})
  133. }
  134. if h.keyOps != nil {
  135. pairs = append(pairs, &HeaderPair{Key: KeyOpsKey, Value: *(h.keyOps)})
  136. }
  137. if h.keyUsage != nil {
  138. pairs = append(pairs, &HeaderPair{Key: KeyUsageKey, Value: *(h.keyUsage)})
  139. }
  140. if h.x != nil {
  141. pairs = append(pairs, &HeaderPair{Key: ECDSAXKey, Value: h.x})
  142. }
  143. if h.x509CertChain != nil {
  144. pairs = append(pairs, &HeaderPair{Key: X509CertChainKey, Value: *(h.x509CertChain)})
  145. }
  146. if h.x509CertThumbprint != nil {
  147. pairs = append(pairs, &HeaderPair{Key: X509CertThumbprintKey, Value: *(h.x509CertThumbprint)})
  148. }
  149. if h.x509CertThumbprintS256 != nil {
  150. pairs = append(pairs, &HeaderPair{Key: X509CertThumbprintS256Key, Value: *(h.x509CertThumbprintS256)})
  151. }
  152. if h.x509URL != nil {
  153. pairs = append(pairs, &HeaderPair{Key: X509URLKey, Value: *(h.x509URL)})
  154. }
  155. if h.y != nil {
  156. pairs = append(pairs, &HeaderPair{Key: ECDSAYKey, Value: h.y})
  157. }
  158. for k, v := range h.privateParams {
  159. pairs = append(pairs, &HeaderPair{Key: k, Value: v})
  160. }
  161. return pairs
  162. }
  163. func (h *ecdsaPublicKey) PrivateParams() map[string]interface{} {
  164. return h.privateParams
  165. }
  166. func (h *ecdsaPublicKey) Get(name string) (interface{}, bool) {
  167. h.mu.RLock()
  168. defer h.mu.RUnlock()
  169. switch name {
  170. case KeyTypeKey:
  171. return h.KeyType(), true
  172. case AlgorithmKey:
  173. if h.algorithm == nil {
  174. return nil, false
  175. }
  176. return *(h.algorithm), true
  177. case ECDSACrvKey:
  178. if h.crv == nil {
  179. return nil, false
  180. }
  181. return *(h.crv), true
  182. case KeyIDKey:
  183. if h.keyID == nil {
  184. return nil, false
  185. }
  186. return *(h.keyID), true
  187. case KeyOpsKey:
  188. if h.keyOps == nil {
  189. return nil, false
  190. }
  191. return *(h.keyOps), true
  192. case KeyUsageKey:
  193. if h.keyUsage == nil {
  194. return nil, false
  195. }
  196. return *(h.keyUsage), true
  197. case ECDSAXKey:
  198. if h.x == nil {
  199. return nil, false
  200. }
  201. return h.x, true
  202. case X509CertChainKey:
  203. if h.x509CertChain == nil {
  204. return nil, false
  205. }
  206. return h.x509CertChain.Get(), true
  207. case X509CertThumbprintKey:
  208. if h.x509CertThumbprint == nil {
  209. return nil, false
  210. }
  211. return *(h.x509CertThumbprint), true
  212. case X509CertThumbprintS256Key:
  213. if h.x509CertThumbprintS256 == nil {
  214. return nil, false
  215. }
  216. return *(h.x509CertThumbprintS256), true
  217. case X509URLKey:
  218. if h.x509URL == nil {
  219. return nil, false
  220. }
  221. return *(h.x509URL), true
  222. case ECDSAYKey:
  223. if h.y == nil {
  224. return nil, false
  225. }
  226. return h.y, true
  227. default:
  228. v, ok := h.privateParams[name]
  229. return v, ok
  230. }
  231. }
  232. func (h *ecdsaPublicKey) Set(name string, value interface{}) error {
  233. h.mu.Lock()
  234. defer h.mu.Unlock()
  235. return h.setNoLock(name, value)
  236. }
  237. func (h *ecdsaPublicKey) setNoLock(name string, value interface{}) error {
  238. switch name {
  239. case "kty":
  240. return nil
  241. case AlgorithmKey:
  242. switch v := value.(type) {
  243. case string:
  244. h.algorithm = &v
  245. case fmt.Stringer:
  246. tmp := v.String()
  247. h.algorithm = &tmp
  248. default:
  249. return errors.Errorf(`invalid type for %s key: %T`, AlgorithmKey, value)
  250. }
  251. return nil
  252. case ECDSACrvKey:
  253. if v, ok := value.(jwa.EllipticCurveAlgorithm); ok {
  254. h.crv = &v
  255. return nil
  256. }
  257. return errors.Errorf(`invalid value for %s key: %T`, ECDSACrvKey, value)
  258. case KeyIDKey:
  259. if v, ok := value.(string); ok {
  260. h.keyID = &v
  261. return nil
  262. }
  263. return errors.Errorf(`invalid value for %s key: %T`, KeyIDKey, value)
  264. case KeyOpsKey:
  265. var acceptor KeyOperationList
  266. if err := acceptor.Accept(value); err != nil {
  267. return errors.Wrapf(err, `invalid value for %s key`, KeyOpsKey)
  268. }
  269. h.keyOps = &acceptor
  270. return nil
  271. case KeyUsageKey:
  272. switch v := value.(type) {
  273. case KeyUsageType:
  274. switch v {
  275. case ForSignature, ForEncryption:
  276. tmp := v.String()
  277. h.keyUsage = &tmp
  278. default:
  279. return errors.Errorf(`invalid key usage type %s`, v)
  280. }
  281. case string:
  282. h.keyUsage = &v
  283. default:
  284. return errors.Errorf(`invalid key usage type %s`, v)
  285. }
  286. case ECDSAXKey:
  287. if v, ok := value.([]byte); ok {
  288. h.x = v
  289. return nil
  290. }
  291. return errors.Errorf(`invalid value for %s key: %T`, ECDSAXKey, value)
  292. case X509CertChainKey:
  293. var acceptor CertificateChain
  294. if err := acceptor.Accept(value); err != nil {
  295. return errors.Wrapf(err, `invalid value for %s key`, X509CertChainKey)
  296. }
  297. h.x509CertChain = &acceptor
  298. return nil
  299. case X509CertThumbprintKey:
  300. if v, ok := value.(string); ok {
  301. h.x509CertThumbprint = &v
  302. return nil
  303. }
  304. return errors.Errorf(`invalid value for %s key: %T`, X509CertThumbprintKey, value)
  305. case X509CertThumbprintS256Key:
  306. if v, ok := value.(string); ok {
  307. h.x509CertThumbprintS256 = &v
  308. return nil
  309. }
  310. return errors.Errorf(`invalid value for %s key: %T`, X509CertThumbprintS256Key, value)
  311. case X509URLKey:
  312. if v, ok := value.(string); ok {
  313. h.x509URL = &v
  314. return nil
  315. }
  316. return errors.Errorf(`invalid value for %s key: %T`, X509URLKey, value)
  317. case ECDSAYKey:
  318. if v, ok := value.([]byte); ok {
  319. h.y = v
  320. return nil
  321. }
  322. return errors.Errorf(`invalid value for %s key: %T`, ECDSAYKey, value)
  323. default:
  324. if h.privateParams == nil {
  325. h.privateParams = map[string]interface{}{}
  326. }
  327. h.privateParams[name] = value
  328. }
  329. return nil
  330. }
  331. func (k *ecdsaPublicKey) Remove(key string) error {
  332. k.mu.Lock()
  333. defer k.mu.Unlock()
  334. switch key {
  335. case AlgorithmKey:
  336. k.algorithm = nil
  337. case ECDSACrvKey:
  338. k.crv = nil
  339. case KeyIDKey:
  340. k.keyID = nil
  341. case KeyOpsKey:
  342. k.keyOps = nil
  343. case KeyUsageKey:
  344. k.keyUsage = nil
  345. case ECDSAXKey:
  346. k.x = nil
  347. case X509CertChainKey:
  348. k.x509CertChain = nil
  349. case X509CertThumbprintKey:
  350. k.x509CertThumbprint = nil
  351. case X509CertThumbprintS256Key:
  352. k.x509CertThumbprintS256 = nil
  353. case X509URLKey:
  354. k.x509URL = nil
  355. case ECDSAYKey:
  356. k.y = nil
  357. default:
  358. delete(k.privateParams, key)
  359. }
  360. return nil
  361. }
  362. func (k *ecdsaPublicKey) Clone() (Key, error) {
  363. return cloneKey(k)
  364. }
  365. func (k *ecdsaPublicKey) DecodeCtx() json.DecodeCtx {
  366. k.mu.RLock()
  367. defer k.mu.RUnlock()
  368. return k.dc
  369. }
  370. func (k *ecdsaPublicKey) SetDecodeCtx(dc json.DecodeCtx) {
  371. k.mu.Lock()
  372. defer k.mu.Unlock()
  373. k.dc = dc
  374. }
  375. func (h *ecdsaPublicKey) UnmarshalJSON(buf []byte) error {
  376. h.algorithm = nil
  377. h.crv = nil
  378. h.keyID = nil
  379. h.keyOps = nil
  380. h.keyUsage = nil
  381. h.x = nil
  382. h.x509CertChain = nil
  383. h.x509CertThumbprint = nil
  384. h.x509CertThumbprintS256 = nil
  385. h.x509URL = nil
  386. h.y = nil
  387. dec := json.NewDecoder(bytes.NewReader(buf))
  388. LOOP:
  389. for {
  390. tok, err := dec.Token()
  391. if err != nil {
  392. return errors.Wrap(err, `error reading token`)
  393. }
  394. switch tok := tok.(type) {
  395. case json.Delim:
  396. // Assuming we're doing everything correctly, we should ONLY
  397. // get either '{' or '}' here.
  398. if tok == '}' { // End of object
  399. break LOOP
  400. } else if tok != '{' {
  401. return errors.Errorf(`expected '{', but got '%c'`, tok)
  402. }
  403. case string: // Objects can only have string keys
  404. switch tok {
  405. case KeyTypeKey:
  406. val, err := json.ReadNextStringToken(dec)
  407. if err != nil {
  408. return errors.Wrap(err, `error reading token`)
  409. }
  410. if val != jwa.EC.String() {
  411. return errors.Errorf(`invalid kty value for RSAPublicKey (%s)`, val)
  412. }
  413. case AlgorithmKey:
  414. if err := json.AssignNextStringToken(&h.algorithm, dec); err != nil {
  415. return errors.Wrapf(err, `failed to decode value for key %s`, AlgorithmKey)
  416. }
  417. case ECDSACrvKey:
  418. var decoded jwa.EllipticCurveAlgorithm
  419. if err := dec.Decode(&decoded); err != nil {
  420. return errors.Wrapf(err, `failed to decode value for key %s`, ECDSACrvKey)
  421. }
  422. h.crv = &decoded
  423. case KeyIDKey:
  424. if err := json.AssignNextStringToken(&h.keyID, dec); err != nil {
  425. return errors.Wrapf(err, `failed to decode value for key %s`, KeyIDKey)
  426. }
  427. case KeyOpsKey:
  428. var decoded KeyOperationList
  429. if err := dec.Decode(&decoded); err != nil {
  430. return errors.Wrapf(err, `failed to decode value for key %s`, KeyOpsKey)
  431. }
  432. h.keyOps = &decoded
  433. case KeyUsageKey:
  434. if err := json.AssignNextStringToken(&h.keyUsage, dec); err != nil {
  435. return errors.Wrapf(err, `failed to decode value for key %s`, KeyUsageKey)
  436. }
  437. case ECDSAXKey:
  438. if err := json.AssignNextBytesToken(&h.x, dec); err != nil {
  439. return errors.Wrapf(err, `failed to decode value for key %s`, ECDSAXKey)
  440. }
  441. case X509CertChainKey:
  442. var decoded CertificateChain
  443. if err := dec.Decode(&decoded); err != nil {
  444. return errors.Wrapf(err, `failed to decode value for key %s`, X509CertChainKey)
  445. }
  446. h.x509CertChain = &decoded
  447. case X509CertThumbprintKey:
  448. if err := json.AssignNextStringToken(&h.x509CertThumbprint, dec); err != nil {
  449. return errors.Wrapf(err, `failed to decode value for key %s`, X509CertThumbprintKey)
  450. }
  451. case X509CertThumbprintS256Key:
  452. if err := json.AssignNextStringToken(&h.x509CertThumbprintS256, dec); err != nil {
  453. return errors.Wrapf(err, `failed to decode value for key %s`, X509CertThumbprintS256Key)
  454. }
  455. case X509URLKey:
  456. if err := json.AssignNextStringToken(&h.x509URL, dec); err != nil {
  457. return errors.Wrapf(err, `failed to decode value for key %s`, X509URLKey)
  458. }
  459. case ECDSAYKey:
  460. if err := json.AssignNextBytesToken(&h.y, dec); err != nil {
  461. return errors.Wrapf(err, `failed to decode value for key %s`, ECDSAYKey)
  462. }
  463. default:
  464. if dc := h.dc; dc != nil {
  465. if localReg := dc.Registry(); localReg != nil {
  466. decoded, err := localReg.Decode(dec, tok)
  467. if err == nil {
  468. h.setNoLock(tok, decoded)
  469. continue
  470. }
  471. }
  472. }
  473. decoded, err := registry.Decode(dec, tok)
  474. if err == nil {
  475. h.setNoLock(tok, decoded)
  476. continue
  477. }
  478. return errors.Wrapf(err, `could not decode field %s`, tok)
  479. }
  480. default:
  481. return errors.Errorf(`invalid token %T`, tok)
  482. }
  483. }
  484. if h.crv == nil {
  485. return errors.Errorf(`required field crv is missing`)
  486. }
  487. if h.x == nil {
  488. return errors.Errorf(`required field x is missing`)
  489. }
  490. if h.y == nil {
  491. return errors.Errorf(`required field y is missing`)
  492. }
  493. return nil
  494. }
  495. func (h ecdsaPublicKey) MarshalJSON() ([]byte, error) {
  496. data := make(map[string]interface{})
  497. fields := make([]string, 0, 11)
  498. for _, pair := range h.makePairs() {
  499. fields = append(fields, pair.Key.(string))
  500. data[pair.Key.(string)] = pair.Value
  501. }
  502. sort.Strings(fields)
  503. buf := pool.GetBytesBuffer()
  504. defer pool.ReleaseBytesBuffer(buf)
  505. buf.WriteByte('{')
  506. enc := json.NewEncoder(buf)
  507. for i, f := range fields {
  508. if i > 0 {
  509. buf.WriteRune(',')
  510. }
  511. buf.WriteRune('"')
  512. buf.WriteString(f)
  513. buf.WriteString(`":`)
  514. v := data[f]
  515. switch v := v.(type) {
  516. case []byte:
  517. buf.WriteRune('"')
  518. buf.WriteString(base64.EncodeToString(v))
  519. buf.WriteRune('"')
  520. default:
  521. if err := enc.Encode(v); err != nil {
  522. return nil, errors.Wrapf(err, `failed to encode value for field %s`, f)
  523. }
  524. buf.Truncate(buf.Len() - 1)
  525. }
  526. }
  527. buf.WriteByte('}')
  528. ret := make([]byte, buf.Len())
  529. copy(ret, buf.Bytes())
  530. return ret, nil
  531. }
  532. func (h *ecdsaPublicKey) Iterate(ctx context.Context) HeaderIterator {
  533. pairs := h.makePairs()
  534. ch := make(chan *HeaderPair, len(pairs))
  535. go func(ctx context.Context, ch chan *HeaderPair, pairs []*HeaderPair) {
  536. defer close(ch)
  537. for _, pair := range pairs {
  538. select {
  539. case <-ctx.Done():
  540. return
  541. case ch <- pair:
  542. }
  543. }
  544. }(ctx, ch, pairs)
  545. return mapiter.New(ch)
  546. }
  547. func (h *ecdsaPublicKey) Walk(ctx context.Context, visitor HeaderVisitor) error {
  548. return iter.WalkMap(ctx, h, visitor)
  549. }
  550. func (h *ecdsaPublicKey) AsMap(ctx context.Context) (map[string]interface{}, error) {
  551. return iter.AsMap(ctx, h)
  552. }
  553. type ECDSAPrivateKey interface {
  554. Key
  555. FromRaw(*ecdsa.PrivateKey) error
  556. Crv() jwa.EllipticCurveAlgorithm
  557. D() []byte
  558. X() []byte
  559. Y() []byte
  560. }
  561. type ecdsaPrivateKey struct {
  562. algorithm *string // https://tools.ietf.org/html/rfc7517#section-4.4
  563. crv *jwa.EllipticCurveAlgorithm
  564. d []byte
  565. keyID *string // https://tools.ietf.org/html/rfc7515#section-4.1.4
  566. keyOps *KeyOperationList // https://tools.ietf.org/html/rfc7517#section-4.3
  567. keyUsage *string // https://tools.ietf.org/html/rfc7517#section-4.2
  568. x []byte
  569. x509CertChain *CertificateChain // https://tools.ietf.org/html/rfc7515#section-4.1.6
  570. x509CertThumbprint *string // https://tools.ietf.org/html/rfc7515#section-4.1.7
  571. x509CertThumbprintS256 *string // https://tools.ietf.org/html/rfc7515#section-4.1.8
  572. x509URL *string // https://tools.ietf.org/html/rfc7515#section-4.1.5
  573. y []byte
  574. privateParams map[string]interface{}
  575. mu *sync.RWMutex
  576. dc json.DecodeCtx
  577. }
  578. func NewECDSAPrivateKey() ECDSAPrivateKey {
  579. return newECDSAPrivateKey()
  580. }
  581. func newECDSAPrivateKey() *ecdsaPrivateKey {
  582. return &ecdsaPrivateKey{
  583. mu: &sync.RWMutex{},
  584. privateParams: make(map[string]interface{}),
  585. }
  586. }
  587. func (h ecdsaPrivateKey) KeyType() jwa.KeyType {
  588. return jwa.EC
  589. }
  590. func (h *ecdsaPrivateKey) Algorithm() string {
  591. if h.algorithm != nil {
  592. return *(h.algorithm)
  593. }
  594. return ""
  595. }
  596. func (h *ecdsaPrivateKey) Crv() jwa.EllipticCurveAlgorithm {
  597. if h.crv != nil {
  598. return *(h.crv)
  599. }
  600. return jwa.InvalidEllipticCurve
  601. }
  602. func (h *ecdsaPrivateKey) D() []byte {
  603. return h.d
  604. }
  605. func (h *ecdsaPrivateKey) KeyID() string {
  606. if h.keyID != nil {
  607. return *(h.keyID)
  608. }
  609. return ""
  610. }
  611. func (h *ecdsaPrivateKey) KeyOps() KeyOperationList {
  612. if h.keyOps != nil {
  613. return *(h.keyOps)
  614. }
  615. return nil
  616. }
  617. func (h *ecdsaPrivateKey) KeyUsage() string {
  618. if h.keyUsage != nil {
  619. return *(h.keyUsage)
  620. }
  621. return ""
  622. }
  623. func (h *ecdsaPrivateKey) X() []byte {
  624. return h.x
  625. }
  626. func (h *ecdsaPrivateKey) X509CertChain() []*x509.Certificate {
  627. if h.x509CertChain != nil {
  628. return h.x509CertChain.Get()
  629. }
  630. return nil
  631. }
  632. func (h *ecdsaPrivateKey) X509CertThumbprint() string {
  633. if h.x509CertThumbprint != nil {
  634. return *(h.x509CertThumbprint)
  635. }
  636. return ""
  637. }
  638. func (h *ecdsaPrivateKey) X509CertThumbprintS256() string {
  639. if h.x509CertThumbprintS256 != nil {
  640. return *(h.x509CertThumbprintS256)
  641. }
  642. return ""
  643. }
  644. func (h *ecdsaPrivateKey) X509URL() string {
  645. if h.x509URL != nil {
  646. return *(h.x509URL)
  647. }
  648. return ""
  649. }
  650. func (h *ecdsaPrivateKey) Y() []byte {
  651. return h.y
  652. }
  653. func (h *ecdsaPrivateKey) makePairs() []*HeaderPair {
  654. h.mu.RLock()
  655. defer h.mu.RUnlock()
  656. var pairs []*HeaderPair
  657. pairs = append(pairs, &HeaderPair{Key: "kty", Value: jwa.EC})
  658. if h.algorithm != nil {
  659. pairs = append(pairs, &HeaderPair{Key: AlgorithmKey, Value: *(h.algorithm)})
  660. }
  661. if h.crv != nil {
  662. pairs = append(pairs, &HeaderPair{Key: ECDSACrvKey, Value: *(h.crv)})
  663. }
  664. if h.d != nil {
  665. pairs = append(pairs, &HeaderPair{Key: ECDSADKey, Value: h.d})
  666. }
  667. if h.keyID != nil {
  668. pairs = append(pairs, &HeaderPair{Key: KeyIDKey, Value: *(h.keyID)})
  669. }
  670. if h.keyOps != nil {
  671. pairs = append(pairs, &HeaderPair{Key: KeyOpsKey, Value: *(h.keyOps)})
  672. }
  673. if h.keyUsage != nil {
  674. pairs = append(pairs, &HeaderPair{Key: KeyUsageKey, Value: *(h.keyUsage)})
  675. }
  676. if h.x != nil {
  677. pairs = append(pairs, &HeaderPair{Key: ECDSAXKey, Value: h.x})
  678. }
  679. if h.x509CertChain != nil {
  680. pairs = append(pairs, &HeaderPair{Key: X509CertChainKey, Value: *(h.x509CertChain)})
  681. }
  682. if h.x509CertThumbprint != nil {
  683. pairs = append(pairs, &HeaderPair{Key: X509CertThumbprintKey, Value: *(h.x509CertThumbprint)})
  684. }
  685. if h.x509CertThumbprintS256 != nil {
  686. pairs = append(pairs, &HeaderPair{Key: X509CertThumbprintS256Key, Value: *(h.x509CertThumbprintS256)})
  687. }
  688. if h.x509URL != nil {
  689. pairs = append(pairs, &HeaderPair{Key: X509URLKey, Value: *(h.x509URL)})
  690. }
  691. if h.y != nil {
  692. pairs = append(pairs, &HeaderPair{Key: ECDSAYKey, Value: h.y})
  693. }
  694. for k, v := range h.privateParams {
  695. pairs = append(pairs, &HeaderPair{Key: k, Value: v})
  696. }
  697. return pairs
  698. }
  699. func (h *ecdsaPrivateKey) PrivateParams() map[string]interface{} {
  700. return h.privateParams
  701. }
  702. func (h *ecdsaPrivateKey) Get(name string) (interface{}, bool) {
  703. h.mu.RLock()
  704. defer h.mu.RUnlock()
  705. switch name {
  706. case KeyTypeKey:
  707. return h.KeyType(), true
  708. case AlgorithmKey:
  709. if h.algorithm == nil {
  710. return nil, false
  711. }
  712. return *(h.algorithm), true
  713. case ECDSACrvKey:
  714. if h.crv == nil {
  715. return nil, false
  716. }
  717. return *(h.crv), true
  718. case ECDSADKey:
  719. if h.d == nil {
  720. return nil, false
  721. }
  722. return h.d, true
  723. case KeyIDKey:
  724. if h.keyID == nil {
  725. return nil, false
  726. }
  727. return *(h.keyID), true
  728. case KeyOpsKey:
  729. if h.keyOps == nil {
  730. return nil, false
  731. }
  732. return *(h.keyOps), true
  733. case KeyUsageKey:
  734. if h.keyUsage == nil {
  735. return nil, false
  736. }
  737. return *(h.keyUsage), true
  738. case ECDSAXKey:
  739. if h.x == nil {
  740. return nil, false
  741. }
  742. return h.x, true
  743. case X509CertChainKey:
  744. if h.x509CertChain == nil {
  745. return nil, false
  746. }
  747. return h.x509CertChain.Get(), true
  748. case X509CertThumbprintKey:
  749. if h.x509CertThumbprint == nil {
  750. return nil, false
  751. }
  752. return *(h.x509CertThumbprint), true
  753. case X509CertThumbprintS256Key:
  754. if h.x509CertThumbprintS256 == nil {
  755. return nil, false
  756. }
  757. return *(h.x509CertThumbprintS256), true
  758. case X509URLKey:
  759. if h.x509URL == nil {
  760. return nil, false
  761. }
  762. return *(h.x509URL), true
  763. case ECDSAYKey:
  764. if h.y == nil {
  765. return nil, false
  766. }
  767. return h.y, true
  768. default:
  769. v, ok := h.privateParams[name]
  770. return v, ok
  771. }
  772. }
  773. func (h *ecdsaPrivateKey) Set(name string, value interface{}) error {
  774. h.mu.Lock()
  775. defer h.mu.Unlock()
  776. return h.setNoLock(name, value)
  777. }
  778. func (h *ecdsaPrivateKey) setNoLock(name string, value interface{}) error {
  779. switch name {
  780. case "kty":
  781. return nil
  782. case AlgorithmKey:
  783. switch v := value.(type) {
  784. case string:
  785. h.algorithm = &v
  786. case fmt.Stringer:
  787. tmp := v.String()
  788. h.algorithm = &tmp
  789. default:
  790. return errors.Errorf(`invalid type for %s key: %T`, AlgorithmKey, value)
  791. }
  792. return nil
  793. case ECDSACrvKey:
  794. if v, ok := value.(jwa.EllipticCurveAlgorithm); ok {
  795. h.crv = &v
  796. return nil
  797. }
  798. return errors.Errorf(`invalid value for %s key: %T`, ECDSACrvKey, value)
  799. case ECDSADKey:
  800. if v, ok := value.([]byte); ok {
  801. h.d = v
  802. return nil
  803. }
  804. return errors.Errorf(`invalid value for %s key: %T`, ECDSADKey, value)
  805. case KeyIDKey:
  806. if v, ok := value.(string); ok {
  807. h.keyID = &v
  808. return nil
  809. }
  810. return errors.Errorf(`invalid value for %s key: %T`, KeyIDKey, value)
  811. case KeyOpsKey:
  812. var acceptor KeyOperationList
  813. if err := acceptor.Accept(value); err != nil {
  814. return errors.Wrapf(err, `invalid value for %s key`, KeyOpsKey)
  815. }
  816. h.keyOps = &acceptor
  817. return nil
  818. case KeyUsageKey:
  819. switch v := value.(type) {
  820. case KeyUsageType:
  821. switch v {
  822. case ForSignature, ForEncryption:
  823. tmp := v.String()
  824. h.keyUsage = &tmp
  825. default:
  826. return errors.Errorf(`invalid key usage type %s`, v)
  827. }
  828. case string:
  829. h.keyUsage = &v
  830. default:
  831. return errors.Errorf(`invalid key usage type %s`, v)
  832. }
  833. case ECDSAXKey:
  834. if v, ok := value.([]byte); ok {
  835. h.x = v
  836. return nil
  837. }
  838. return errors.Errorf(`invalid value for %s key: %T`, ECDSAXKey, value)
  839. case X509CertChainKey:
  840. var acceptor CertificateChain
  841. if err := acceptor.Accept(value); err != nil {
  842. return errors.Wrapf(err, `invalid value for %s key`, X509CertChainKey)
  843. }
  844. h.x509CertChain = &acceptor
  845. return nil
  846. case X509CertThumbprintKey:
  847. if v, ok := value.(string); ok {
  848. h.x509CertThumbprint = &v
  849. return nil
  850. }
  851. return errors.Errorf(`invalid value for %s key: %T`, X509CertThumbprintKey, value)
  852. case X509CertThumbprintS256Key:
  853. if v, ok := value.(string); ok {
  854. h.x509CertThumbprintS256 = &v
  855. return nil
  856. }
  857. return errors.Errorf(`invalid value for %s key: %T`, X509CertThumbprintS256Key, value)
  858. case X509URLKey:
  859. if v, ok := value.(string); ok {
  860. h.x509URL = &v
  861. return nil
  862. }
  863. return errors.Errorf(`invalid value for %s key: %T`, X509URLKey, value)
  864. case ECDSAYKey:
  865. if v, ok := value.([]byte); ok {
  866. h.y = v
  867. return nil
  868. }
  869. return errors.Errorf(`invalid value for %s key: %T`, ECDSAYKey, value)
  870. default:
  871. if h.privateParams == nil {
  872. h.privateParams = map[string]interface{}{}
  873. }
  874. h.privateParams[name] = value
  875. }
  876. return nil
  877. }
  878. func (k *ecdsaPrivateKey) Remove(key string) error {
  879. k.mu.Lock()
  880. defer k.mu.Unlock()
  881. switch key {
  882. case AlgorithmKey:
  883. k.algorithm = nil
  884. case ECDSACrvKey:
  885. k.crv = nil
  886. case ECDSADKey:
  887. k.d = nil
  888. case KeyIDKey:
  889. k.keyID = nil
  890. case KeyOpsKey:
  891. k.keyOps = nil
  892. case KeyUsageKey:
  893. k.keyUsage = nil
  894. case ECDSAXKey:
  895. k.x = nil
  896. case X509CertChainKey:
  897. k.x509CertChain = nil
  898. case X509CertThumbprintKey:
  899. k.x509CertThumbprint = nil
  900. case X509CertThumbprintS256Key:
  901. k.x509CertThumbprintS256 = nil
  902. case X509URLKey:
  903. k.x509URL = nil
  904. case ECDSAYKey:
  905. k.y = nil
  906. default:
  907. delete(k.privateParams, key)
  908. }
  909. return nil
  910. }
  911. func (k *ecdsaPrivateKey) Clone() (Key, error) {
  912. return cloneKey(k)
  913. }
  914. func (k *ecdsaPrivateKey) DecodeCtx() json.DecodeCtx {
  915. k.mu.RLock()
  916. defer k.mu.RUnlock()
  917. return k.dc
  918. }
  919. func (k *ecdsaPrivateKey) SetDecodeCtx(dc json.DecodeCtx) {
  920. k.mu.Lock()
  921. defer k.mu.Unlock()
  922. k.dc = dc
  923. }
  924. func (h *ecdsaPrivateKey) UnmarshalJSON(buf []byte) error {
  925. h.algorithm = nil
  926. h.crv = nil
  927. h.d = nil
  928. h.keyID = nil
  929. h.keyOps = nil
  930. h.keyUsage = nil
  931. h.x = nil
  932. h.x509CertChain = nil
  933. h.x509CertThumbprint = nil
  934. h.x509CertThumbprintS256 = nil
  935. h.x509URL = nil
  936. h.y = nil
  937. dec := json.NewDecoder(bytes.NewReader(buf))
  938. LOOP:
  939. for {
  940. tok, err := dec.Token()
  941. if err != nil {
  942. return errors.Wrap(err, `error reading token`)
  943. }
  944. switch tok := tok.(type) {
  945. case json.Delim:
  946. // Assuming we're doing everything correctly, we should ONLY
  947. // get either '{' or '}' here.
  948. if tok == '}' { // End of object
  949. break LOOP
  950. } else if tok != '{' {
  951. return errors.Errorf(`expected '{', but got '%c'`, tok)
  952. }
  953. case string: // Objects can only have string keys
  954. switch tok {
  955. case KeyTypeKey:
  956. val, err := json.ReadNextStringToken(dec)
  957. if err != nil {
  958. return errors.Wrap(err, `error reading token`)
  959. }
  960. if val != jwa.EC.String() {
  961. return errors.Errorf(`invalid kty value for RSAPublicKey (%s)`, val)
  962. }
  963. case AlgorithmKey:
  964. if err := json.AssignNextStringToken(&h.algorithm, dec); err != nil {
  965. return errors.Wrapf(err, `failed to decode value for key %s`, AlgorithmKey)
  966. }
  967. case ECDSACrvKey:
  968. var decoded jwa.EllipticCurveAlgorithm
  969. if err := dec.Decode(&decoded); err != nil {
  970. return errors.Wrapf(err, `failed to decode value for key %s`, ECDSACrvKey)
  971. }
  972. h.crv = &decoded
  973. case ECDSADKey:
  974. if err := json.AssignNextBytesToken(&h.d, dec); err != nil {
  975. return errors.Wrapf(err, `failed to decode value for key %s`, ECDSADKey)
  976. }
  977. case KeyIDKey:
  978. if err := json.AssignNextStringToken(&h.keyID, dec); err != nil {
  979. return errors.Wrapf(err, `failed to decode value for key %s`, KeyIDKey)
  980. }
  981. case KeyOpsKey:
  982. var decoded KeyOperationList
  983. if err := dec.Decode(&decoded); err != nil {
  984. return errors.Wrapf(err, `failed to decode value for key %s`, KeyOpsKey)
  985. }
  986. h.keyOps = &decoded
  987. case KeyUsageKey:
  988. if err := json.AssignNextStringToken(&h.keyUsage, dec); err != nil {
  989. return errors.Wrapf(err, `failed to decode value for key %s`, KeyUsageKey)
  990. }
  991. case ECDSAXKey:
  992. if err := json.AssignNextBytesToken(&h.x, dec); err != nil {
  993. return errors.Wrapf(err, `failed to decode value for key %s`, ECDSAXKey)
  994. }
  995. case X509CertChainKey:
  996. var decoded CertificateChain
  997. if err := dec.Decode(&decoded); err != nil {
  998. return errors.Wrapf(err, `failed to decode value for key %s`, X509CertChainKey)
  999. }
  1000. h.x509CertChain = &decoded
  1001. case X509CertThumbprintKey:
  1002. if err := json.AssignNextStringToken(&h.x509CertThumbprint, dec); err != nil {
  1003. return errors.Wrapf(err, `failed to decode value for key %s`, X509CertThumbprintKey)
  1004. }
  1005. case X509CertThumbprintS256Key:
  1006. if err := json.AssignNextStringToken(&h.x509CertThumbprintS256, dec); err != nil {
  1007. return errors.Wrapf(err, `failed to decode value for key %s`, X509CertThumbprintS256Key)
  1008. }
  1009. case X509URLKey:
  1010. if err := json.AssignNextStringToken(&h.x509URL, dec); err != nil {
  1011. return errors.Wrapf(err, `failed to decode value for key %s`, X509URLKey)
  1012. }
  1013. case ECDSAYKey:
  1014. if err := json.AssignNextBytesToken(&h.y, dec); err != nil {
  1015. return errors.Wrapf(err, `failed to decode value for key %s`, ECDSAYKey)
  1016. }
  1017. default:
  1018. if dc := h.dc; dc != nil {
  1019. if localReg := dc.Registry(); localReg != nil {
  1020. decoded, err := localReg.Decode(dec, tok)
  1021. if err == nil {
  1022. h.setNoLock(tok, decoded)
  1023. continue
  1024. }
  1025. }
  1026. }
  1027. decoded, err := registry.Decode(dec, tok)
  1028. if err == nil {
  1029. h.setNoLock(tok, decoded)
  1030. continue
  1031. }
  1032. return errors.Wrapf(err, `could not decode field %s`, tok)
  1033. }
  1034. default:
  1035. return errors.Errorf(`invalid token %T`, tok)
  1036. }
  1037. }
  1038. if h.crv == nil {
  1039. return errors.Errorf(`required field crv is missing`)
  1040. }
  1041. if h.d == nil {
  1042. return errors.Errorf(`required field d is missing`)
  1043. }
  1044. if h.x == nil {
  1045. return errors.Errorf(`required field x is missing`)
  1046. }
  1047. if h.y == nil {
  1048. return errors.Errorf(`required field y is missing`)
  1049. }
  1050. return nil
  1051. }
  1052. func (h ecdsaPrivateKey) MarshalJSON() ([]byte, error) {
  1053. data := make(map[string]interface{})
  1054. fields := make([]string, 0, 12)
  1055. for _, pair := range h.makePairs() {
  1056. fields = append(fields, pair.Key.(string))
  1057. data[pair.Key.(string)] = pair.Value
  1058. }
  1059. sort.Strings(fields)
  1060. buf := pool.GetBytesBuffer()
  1061. defer pool.ReleaseBytesBuffer(buf)
  1062. buf.WriteByte('{')
  1063. enc := json.NewEncoder(buf)
  1064. for i, f := range fields {
  1065. if i > 0 {
  1066. buf.WriteRune(',')
  1067. }
  1068. buf.WriteRune('"')
  1069. buf.WriteString(f)
  1070. buf.WriteString(`":`)
  1071. v := data[f]
  1072. switch v := v.(type) {
  1073. case []byte:
  1074. buf.WriteRune('"')
  1075. buf.WriteString(base64.EncodeToString(v))
  1076. buf.WriteRune('"')
  1077. default:
  1078. if err := enc.Encode(v); err != nil {
  1079. return nil, errors.Wrapf(err, `failed to encode value for field %s`, f)
  1080. }
  1081. buf.Truncate(buf.Len() - 1)
  1082. }
  1083. }
  1084. buf.WriteByte('}')
  1085. ret := make([]byte, buf.Len())
  1086. copy(ret, buf.Bytes())
  1087. return ret, nil
  1088. }
  1089. func (h *ecdsaPrivateKey) Iterate(ctx context.Context) HeaderIterator {
  1090. pairs := h.makePairs()
  1091. ch := make(chan *HeaderPair, len(pairs))
  1092. go func(ctx context.Context, ch chan *HeaderPair, pairs []*HeaderPair) {
  1093. defer close(ch)
  1094. for _, pair := range pairs {
  1095. select {
  1096. case <-ctx.Done():
  1097. return
  1098. case ch <- pair:
  1099. }
  1100. }
  1101. }(ctx, ch, pairs)
  1102. return mapiter.New(ch)
  1103. }
  1104. func (h *ecdsaPrivateKey) Walk(ctx context.Context, visitor HeaderVisitor) error {
  1105. return iter.WalkMap(ctx, h, visitor)
  1106. }
  1107. func (h *ecdsaPrivateKey) AsMap(ctx context.Context) (map[string]interface{}, error) {
  1108. return iter.AsMap(ctx, h)
  1109. }