com.nimbusds.jose.crypto.Ed25519Verifier Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of nimbus-jose-jwt Show documentation
Show all versions of nimbus-jose-jwt Show documentation
Java library for Javascript Object Signing and Encryption (JOSE) and
JSON Web Tokens (JWT)
/*
* nimbus-jose-jwt
*
* Copyright 2012-2018, Connect2id Ltd.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use
* this file except in compliance with the License. You may obtain a copy of the
* License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed
* under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the
* specific language governing permissions and limitations under the License.
*/
package com.nimbusds.jose.crypto;
import com.google.crypto.tink.subtle.Ed25519Verify;
import com.nimbusds.jose.*;
import com.nimbusds.jose.crypto.impl.CriticalHeaderParamsDeferral;
import com.nimbusds.jose.crypto.impl.EdDSAProvider;
import com.nimbusds.jose.jwk.Curve;
import com.nimbusds.jose.jwk.OctetKeyPair;
import com.nimbusds.jose.util.Base64URL;
import net.jcip.annotations.ThreadSafe;
import java.security.GeneralSecurityException;
import java.util.Set;
/**
* Ed25519 verifier of {@link com.nimbusds.jose.JWSObject JWS objects}.
* Expects a public {@link OctetKeyPair} with {@code "crv"} Ed25519.
* Uses the Edwards-curve Digital Signature Algorithm (EdDSA).
*
* See RFC 8037
* for more information.
*
*
This class is thread-safe.
*
*
Supports the following algorithm:
*
*
* - {@link com.nimbusds.jose.JWSAlgorithm#EdDSA}
*
- {@link com.nimbusds.jose.JWSAlgorithm#EdDSA} with
* {@link com.nimbusds.jose.jwk.Curve#Ed25519}
*
*
* @author Tim McLean
* @version 2024-05-07
*/
@ThreadSafe
public class Ed25519Verifier extends EdDSAProvider implements JWSVerifier, CriticalHeaderParamsAware {
private final CriticalHeaderParamsDeferral critPolicy = new CriticalHeaderParamsDeferral();
private final OctetKeyPair publicKey;
private final Ed25519Verify tinkVerifier;
/**
* Creates a new Ed25519 verifier.
*
* @param publicKey The public Ed25519 key. Must not be {@code null}.
*
* @throws JOSEException If the key subtype is not supported
*/
public Ed25519Verifier(final OctetKeyPair publicKey)
throws JOSEException {
this(publicKey, null);
}
/**
* Creates an Ed25519 verifier.
*
* @param publicKey The public Ed25519 key. Must not be
* {@code null}.
* @param defCritHeaders The names of the critical header parameters
* that are deferred to the application for
* processing, empty set or {@code null} if none.
*
* @throws JOSEException If the key subtype is not supported.
*/
public Ed25519Verifier(final OctetKeyPair publicKey, final Set defCritHeaders)
throws JOSEException {
super();
if (! Curve.Ed25519.equals(publicKey.getCurve())) {
throw new JOSEException("Ed25519Verifier only supports OctetKeyPairs with crv=Ed25519");
}
if (publicKey.isPrivate()) {
throw new JOSEException("Ed25519Verifier requires a public key, use OctetKeyPair.toPublicJWK()");
}
this.publicKey = publicKey;
tinkVerifier = new Ed25519Verify(publicKey.getDecodedX());
critPolicy.setDeferredCriticalHeaderParams(defCritHeaders);
}
/**
* Returns the public key.
*
* @return An OctetKeyPair without the private part
*/
public OctetKeyPair getPublicKey() {
return publicKey;
}
@Override
public Set getProcessedCriticalHeaderParams() {
return critPolicy.getProcessedCriticalHeaderParams();
}
@Override
public Set getDeferredCriticalHeaderParams() {
return critPolicy.getProcessedCriticalHeaderParams();
}
@Override
public boolean verify(final JWSHeader header,
final byte[] signedContent,
final Base64URL signature)
throws JOSEException {
// Check alg field in header
final JWSAlgorithm alg = header.getAlgorithm();
if (! JWSAlgorithm.Ed25519.equals(alg) && ! JWSAlgorithm.EdDSA.equals(alg)) {
throw new JOSEException("Ed25519Verifier requires alg=Ed25519 or alg=EdDSA in JWSHeader");
}
// Check for unrecognized "crit" properties
if (! critPolicy.headerPasses(header)) {
return false;
}
final byte[] jwsSignature = signature.decode();
try {
tinkVerifier.verify(jwsSignature, signedContent);
return true;
} catch (GeneralSecurityException e) {
return false;
}
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy