Skip to content

Commit

Permalink
add Crypto.JOSE.JWK.negotiateJWSAlg
Browse files Browse the repository at this point in the history
Add `Crypto.JOSE.JWK.negotiateJWSAlg` which chooses the
cryptographically strongest JWS algorithm for a given key,
optionally restricted to a given set of algorithms.

#118
  • Loading branch information
frasertweedale committed Dec 14, 2023
1 parent 4558cb9 commit 6a03a25
Show file tree
Hide file tree
Showing 2 changed files with 65 additions and 21 deletions.
9 changes: 9 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,11 @@
## Version NEXT

- Add `Crypto.JOSE.JWK.negotiateJWSAlg` which chooses the
cryptographically strongest JWS algorithm for a given key,
optionally restricted to a given set of algorithms.
([#118][])


## Version 0.11 (2023-10-31)

- Migrate to the *crypton* library ecosystem. *crypton* was a hard
Expand Down Expand Up @@ -51,6 +59,7 @@
[#91]: https://github.com/frasertweedale/hs-jose/issues/91
[#106]: https://github.com/frasertweedale/hs-jose/issues/106
[#107]: https://github.com/frasertweedale/hs-jose/issues/107
[#118]: https://github.com/frasertweedale/hs-jose/issues/118


## Older versions
Expand Down
77 changes: 56 additions & 21 deletions src/Crypto/JOSE/JWK.hs
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
-- Copyright (C) 2013, 2014, 2015, 2016, 2017 Fraser Tweedale
-- Copyright (C) 2013-2023 Fraser Tweedale
--
-- Licensed under the Apache License, Version 2.0 (the "License");
-- you may not use this file except in compliance with the License.
Expand Down Expand Up @@ -83,6 +83,7 @@ module Crypto.JOSE.JWK

-- Miscellaneous
, checkJWK
, negotiateJWSAlg
, bestJWSAlg

, module Crypto.JOSE.JWA.JWK
Expand All @@ -91,6 +92,7 @@ module Crypto.JOSE.JWK
import Control.Applicative
import Control.Monad ((>=>))
import Data.Function (on)
import Data.List (find)
import Data.Maybe (catMaybes)
import Data.Word (Word8)

Expand Down Expand Up @@ -317,33 +319,66 @@ checkJWK jwk = case view jwkMaterial jwk of
-- | Choose the cryptographically strongest JWS algorithm for a
-- given key. The JWK "alg" algorithm parameter is ignored.
--
-- See also 'negotiateJWSAlg'.
--
-- @
-- bestJWSAlg k = negotiateJWSAlg k Nothing
-- @
--
bestJWSAlg
:: (MonadError e m, AsError e)
=> JWK
-> m JWA.JWS.Alg
bestJWSAlg jwk = case view jwkMaterial jwk of
ECKeyMaterial k -> pure $ case view ecCrv k of
P_256 -> JWA.JWS.ES256
P_384 -> JWA.JWS.ES384
P_521 -> JWA.JWS.ES512
Secp256k1 -> JWA.JWS.ES256K
RSAKeyMaterial k ->
let
bestJWSAlg jwk = negotiateJWSAlg jwk Nothing

-- | Choose the cryptographically strongest JWS algorithm for a
-- given key, optionally restricted to a given set of algorithms.
-- This function supports negotiation use cases where the verifier
-- declares its supported algorithms.
--
-- Throws an error if the key is too small or cannot be used for
-- signing, or if there is no overlap between the allowed algorithms
-- (when given) and the algorithms supported by the key type.
--
-- RSASSA-PSS algorithms are preferred over RSASSA-PKCS1-v1_5.
--
-- The JWK "alg" parameter is ignored.
--
negotiateJWSAlg
:: (MonadError e m, AsError e)
=> JWK
-> Maybe (NonEmpty JWA.JWS.Alg)
-> m JWA.JWS.Alg
negotiateJWSAlg jwk allowed = case view jwkMaterial jwk of
ECKeyMaterial k -> case view ecCrv k of
P_256 | ok JWA.JWS.ES256 -> pure JWA.JWS.ES256
P_384 | ok JWA.JWS.ES384 -> pure JWA.JWS.ES384
P_521 | ok JWA.JWS.ES512 -> pure JWA.JWS.ES512
Secp256k1 | ok JWA.JWS.ES256K -> pure JWA.JWS.ES256K
_ -> negoFail
RSAKeyMaterial k
| n < 2 ^ (2040 :: Integer) -> throwing_ _KeySizeTooSmall
| otherwise -> maybe negoFail pure (find ok rsaAlgs)
where
Types.Base64Integer n = view rsaN k
in
if n >= 2 ^ (2040 :: Integer)
then pure JWA.JWS.PS512
else throwing_ _KeySizeTooSmall
rsaAlgs =
[ JWA.JWS.PS512 , JWA.JWS.PS384 , JWA.JWS.PS256
, JWA.JWS.RS512 , JWA.JWS.RS384 , JWA.JWS.RS256 ]
OctKeyMaterial (OctKeyParameters (Types.Base64Octets k))
| B.length k >= 512 `div` 8 -> pure JWA.JWS.HS512
| B.length k >= 384 `div` 8 -> pure JWA.JWS.HS384
| B.length k >= 256 `div` 8 -> pure JWA.JWS.HS256
| otherwise -> throwing_ _KeySizeTooSmall
| B.length k >= 512 `div` 8, ok JWA.JWS.HS512 -> pure JWA.JWS.HS512
| B.length k >= 384 `div` 8, ok JWA.JWS.HS384 -> pure JWA.JWS.HS384
| B.length k >= 256 `div` 8, ok JWA.JWS.HS256 -> pure JWA.JWS.HS256
| B.length k >= 256 `div` 8 -> negoFail
| otherwise -> throwing_ _KeySizeTooSmall
OKPKeyMaterial k -> case k of
(Ed25519Key _ _) -> pure JWA.JWS.EdDSA
(Ed448Key _ _) -> pure JWA.JWS.EdDSA
(X25519Key _ _) -> throwing _KeyMismatch "Cannot sign with X25519 key"
(X448Key _ _) -> throwing _KeyMismatch "Cannot sign with X448 key"
(X25519Key _ _) -> throwing _KeyMismatch "Cannot sign with X25519 key"
(X448Key _ _) -> throwing _KeyMismatch "Cannot sign with X448 key"
(Ed25519Key _ _) | ok JWA.JWS.EdDSA -> pure JWA.JWS.EdDSA
(Ed448Key _ _) | ok JWA.JWS.EdDSA -> pure JWA.JWS.EdDSA
_ -> negoFail
where
ok alg = maybe True (alg `elem`) allowed
negoFail = throwing _AlgorithmMismatch "Algorithm negotation failed"


-- | Compute the JWK Thumbprint of a JWK
Expand Down

0 comments on commit 6a03a25

Please sign in to comment.