All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.nimbusds.jose.crypto.ECDSAVerifier Maven / Gradle / Ivy

Go to download

Java library for Javascript Object Signing and Encryption (JOSE) and JSON Web Tokens (JWT)

There is a newer version: 9.48
Show newest version
/*
 * nimbus-jose-jwt
 *
 * Copyright 2012-2016, Connect2id Ltd.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not use
 * this file except in compliance with the License. You may obtain a copy of the
 * License at
 *
 *    http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software distributed
 * under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the
 * specific language governing permissions and limitations under the License.
 */

package com.nimbusds.jose.crypto;


import java.security.InvalidKeyException;
import java.security.Signature;
import java.security.SignatureException;
import java.security.interfaces.ECPublicKey;
import java.util.Set;

import net.jcip.annotations.ThreadSafe;

import com.nimbusds.jose.*;
import com.nimbusds.jose.crypto.impl.AlgorithmSupportMessage;
import com.nimbusds.jose.crypto.impl.CriticalHeaderParamsDeferral;
import com.nimbusds.jose.crypto.impl.ECDSA;
import com.nimbusds.jose.crypto.impl.ECDSAProvider;
import com.nimbusds.jose.crypto.utils.ECChecks;
import com.nimbusds.jose.jwk.Curve;
import com.nimbusds.jose.jwk.ECKey;
import com.nimbusds.jose.util.Base64URL;


/**
 * Elliptic Curve Digital Signature Algorithm (ECDSA) verifier of 
 * {@link com.nimbusds.jose.JWSObject JWS objects}. Expects a public EC key
 * (with a P-256, P-384,  P-521 or secp256k1 curve).
 *
 * 

See RFC 7518 * section 3.4 * for more information. * *

This class is thread-safe. * *

Supports the following algorithms: * *

    *
  • {@link com.nimbusds.jose.JWSAlgorithm#ES256} *
  • {@link com.nimbusds.jose.JWSAlgorithm#ES256K} *
  • {@link com.nimbusds.jose.JWSAlgorithm#ES384} *
  • {@link com.nimbusds.jose.JWSAlgorithm#ES512} *
* * @author Axel Nennker * @author Vladimir Dzhuvinov * @version 2022-04-22 */ @ThreadSafe public class ECDSAVerifier extends ECDSAProvider implements JWSVerifier, CriticalHeaderParamsAware { /** * The critical header policy. */ private final CriticalHeaderParamsDeferral critPolicy = new CriticalHeaderParamsDeferral(); /** * The public EC key. */ private final ECPublicKey publicKey; /** * Creates a new Elliptic Curve Digital Signature Algorithm (ECDSA) * verifier. * * @param publicKey The public EC key. Must not be {@code null}. * * @throws JOSEException If the elliptic curve of key is not supported. */ public ECDSAVerifier(final ECPublicKey publicKey) throws JOSEException { this(publicKey, null); } /** * Creates a new Elliptic Curve Digital Signature Algorithm (ECDSA) * verifier. * * @param ecJWK The EC JSON Web Key (JWK). Must not be {@code null}. * * @throws JOSEException If the elliptic curve of key is not supported. */ public ECDSAVerifier(final ECKey ecJWK) throws JOSEException { this(ecJWK.toECPublicKey()); } /** * Creates a new Elliptic Curve Digital Signature Algorithm (ECDSA) * verifier. * * @param publicKey The public EC key. Must not be {@code null}. * @param defCritHeaders The names of the critical header parameters * that are deferred to the application for * processing, empty set or {@code null} if none. * * @throws JOSEException If the elliptic curve of key is not supported. */ public ECDSAVerifier(final ECPublicKey publicKey, final Set defCritHeaders) throws JOSEException { super(ECDSA.resolveAlgorithm(publicKey)); this.publicKey = publicKey; if (! ECChecks.isPointOnCurve( publicKey, Curve.forJWSAlgorithm(supportedECDSAAlgorithm()).iterator().next().toECParameterSpec())) { throw new JOSEException("Curve / public key parameters mismatch"); } critPolicy.setDeferredCriticalHeaderParams(defCritHeaders); } /** * Returns the public EC key. * * @return The public EC key. */ public ECPublicKey getPublicKey() { return publicKey; } @Override public Set getProcessedCriticalHeaderParams() { return critPolicy.getProcessedCriticalHeaderParams(); } @Override public Set getDeferredCriticalHeaderParams() { return critPolicy.getProcessedCriticalHeaderParams(); } @Override public boolean verify(final JWSHeader header, final byte[] signedContent, final Base64URL signature) throws JOSEException { final JWSAlgorithm alg = header.getAlgorithm(); if (! supportedJWSAlgorithms().contains(alg)) { throw new JOSEException(AlgorithmSupportMessage.unsupportedJWSAlgorithm(alg, supportedJWSAlgorithms())); } if (! critPolicy.headerPasses(header)) { return false; } final byte[] jwsSignature = signature.decode(); // Prevent CVE-2022-21449 and similar attacks try { ECDSA.ensureLegalSignature(jwsSignature, alg); } catch (JOSEException e) { return false; } final byte[] derSignature; try { derSignature = ECDSA.transcodeSignatureToDER(jwsSignature); } catch (JOSEException e) { // Invalid signature format return false; } Signature sig = ECDSA.getSignerAndVerifier(alg, getJCAContext().getProvider()); try { sig.initVerify(publicKey); sig.update(signedContent); return sig.verify(derSignature); } catch (InvalidKeyException e) { throw new JOSEException("Invalid EC public key: " + e.getMessage(), e); } catch (SignatureException e) { return false; } } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy