io.fusionauth.jwt.rsa.RSAVerifier Maven / Gradle / Ivy
/*
* Copyright (c) 2016-2022, FusionAuth, All Rights Reserved
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
* either express or implied. See the License for the specific
* language governing permissions and limitations under the License.
*/
package io.fusionauth.jwt.rsa;
import io.fusionauth.jwt.InvalidJWTSignatureException;
import io.fusionauth.jwt.InvalidKeyLengthException;
import io.fusionauth.jwt.InvalidKeyTypeException;
import io.fusionauth.jwt.JWTVerifierException;
import io.fusionauth.jwt.MissingPublicKeyException;
import io.fusionauth.jwt.Verifier;
import io.fusionauth.jwt.domain.Algorithm;
import io.fusionauth.pem.domain.PEM;
import io.fusionauth.security.CryptoProvider;
import io.fusionauth.security.DefaultCryptoProvider;
import java.io.IOException;
import java.nio.file.Files;
import java.nio.file.Path;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.security.PublicKey;
import java.security.Signature;
import java.security.SignatureException;
import java.security.interfaces.RSAPublicKey;
import java.util.Objects;
/**
* This class is used to verify a JWT with an RSA signature using an RSA Public Key.
*
* @author Daniel DeGroff
*/
public class RSAVerifier implements Verifier {
private final RSAPublicKey publicKey;
private final CryptoProvider cryptoProvider;
private RSAVerifier(PublicKey publicKey, CryptoProvider cryptoProvider) {
Objects.requireNonNull(publicKey);
Objects.requireNonNull(cryptoProvider);
this.cryptoProvider = cryptoProvider;
if (!(publicKey instanceof RSAPublicKey)) {
throw new InvalidKeyTypeException("Expecting a public key of type [RSAPublicKey], but found [" + publicKey.getClass().getSimpleName() + "].");
}
this.publicKey = (RSAPublicKey) publicKey;
assertValidKeyLength();
}
private RSAVerifier(String publicKey, CryptoProvider cryptoProvider) {
Objects.requireNonNull(publicKey);
Objects.requireNonNull(cryptoProvider);
this.cryptoProvider = cryptoProvider;
PEM pem = PEM.decode(publicKey);
if (pem.publicKey == null) {
throw new MissingPublicKeyException("The provided PEM encoded string did not contain a public key.");
}
if (!(pem.publicKey instanceof RSAPublicKey)) {
throw new InvalidKeyTypeException("Expecting a public key of type [RSAPublicKey], but found [" + pem.publicKey.getClass().getSimpleName() + "].");
}
this.publicKey = pem.getPublicKey();
assertValidKeyLength();
}
/**
* Return a new instance of the RSA Verifier with the provided public key.
*
* @param publicKey The RSA public key object.
* @return a new instance of the RSA verifier.
*/
public static RSAVerifier newVerifier(PublicKey publicKey) {
return new RSAVerifier(publicKey, new DefaultCryptoProvider());
}
/**
* Return a new instance of the RSA Verifier with the provided public key.
*
* @param publicKey The RSA public key object.
* @param cryptoProvider The crypto provider used to get the RSA signature Algorithm.
* @return a new instance of the RSA verifier.
*/
public static RSAVerifier newVerifier(PublicKey publicKey, CryptoProvider cryptoProvider) {
return new RSAVerifier(publicKey, cryptoProvider);
}
/**
* Return a new instance of the RSA Verifier with the provided public key.
*
* @param publicKey The RSA public key PEM.
* @return a new instance of the RSA verifier.
*/
public static RSAVerifier newVerifier(String publicKey) {
return new RSAVerifier(publicKey, new DefaultCryptoProvider());
}
/**
* Return a new instance of the RSA Verifier with the provided public key.
*
* @param publicKey The RSA public key PEM.
* @param cryptoProvider The crypto provider used to get the RSA signature Algorithm.
* @return a new instance of the RSA verifier.
*/
public static RSAVerifier newVerifier(String publicKey, CryptoProvider cryptoProvider) {
return new RSAVerifier(publicKey, cryptoProvider);
}
/**
* Return a new instance of the RSA Verifier with the provided public key.
*
* @param path The path to the RSA public key PEM.
* @return a new instance of the RSA verifier.
*/
public static RSAVerifier newVerifier(Path path) {
return newVerifier(path, new DefaultCryptoProvider());
}
/**
* Return a new instance of the RSA Verifier with the provided public key.
*
* @param path The path to the RSA public key PEM.
* @param cryptoProvider The crypto provider used to get the RSA signature Algorithm.
* @return a new instance of the RSA verifier.
*/
public static RSAVerifier newVerifier(Path path, CryptoProvider cryptoProvider) {
Objects.requireNonNull(path);
try {
return new RSAVerifier(new String(Files.readAllBytes(path)), cryptoProvider);
} catch (IOException e) {
throw new JWTVerifierException("Unable to read the file from path [" + path.toAbsolutePath().toString() + "]", e);
}
}
/**
* Return a new instance of the RSA Verifier with the provided public key.
*
* @param bytes The bytes of the RSA public key PEM.
* @return a new instance of the RSA verifier.
*/
public static RSAVerifier newVerifier(byte[] bytes) {
Objects.requireNonNull(bytes);
return new RSAVerifier((new String(bytes)), new DefaultCryptoProvider());
}
@Override
@SuppressWarnings("Duplicates")
public boolean canVerify(Algorithm algorithm) {
switch (algorithm) {
case RS256:
case RS384:
case RS512:
return true;
default:
return false;
}
}
public void verify(Algorithm algorithm, byte[] message, byte[] signature) {
Objects.requireNonNull(algorithm);
Objects.requireNonNull(message);
Objects.requireNonNull(signature);
try {
Signature verifier = cryptoProvider.getSignatureInstance(algorithm.getName());
verifier.initVerify(publicKey);
verifier.update(message);
if (!verifier.verify(signature)) {
throw new InvalidJWTSignatureException();
}
} catch (InvalidKeyException | NoSuchAlgorithmException | SignatureException | SecurityException e) {
throw new JWTVerifierException("An unexpected exception occurred when attempting to verify the JWT", e);
}
}
private void assertValidKeyLength() {
int keyLength = this.publicKey.getModulus().bitLength();
// We would normally expect 2048, but it turns out it is possible for an RSA key to be generated of length 2047.
if (keyLength < 2047) {
throw new InvalidKeyLengthException("Key length of [" + keyLength + "] is less than the required key length of 2048 bits.");
}
}
}