| /* |
| * JSON Web Token (JWT) processing |
| * |
| * Copyright 2021 HAProxy Technologies |
| * Remi Tricot-Le Breton <rlebreton@haproxy.com> |
| * |
| * This program is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU General Public License |
| * as published by the Free Software Foundation; either version |
| * 2 of the License, or (at your option) any later version. |
| */ |
| |
| #include <import/ebmbtree.h> |
| #include <import/ebsttree.h> |
| |
| #include <haproxy/api.h> |
| #include <haproxy/tools.h> |
| #include <haproxy/openssl-compat.h> |
| #include <haproxy/base64.h> |
| #include <haproxy/jwt.h> |
| |
| |
| #ifdef USE_OPENSSL |
| /* Tree into which the public certificates used to validate JWTs will be stored. */ |
| static struct eb_root jwt_cert_tree = EB_ROOT_UNIQUE; |
| |
| /* |
| * The possible algorithm strings that can be found in a JWS's JOSE header are |
| * defined in section 3.1 of RFC7518. |
| */ |
| enum jwt_alg jwt_parse_alg(const char *alg_str, unsigned int alg_len) |
| { |
| enum jwt_alg alg = JWT_ALG_DEFAULT; |
| |
| /* Algorithms are all 5 characters long apart from "none". */ |
| if (alg_len < sizeof("HS256")-1) { |
| if (strncmp("none", alg_str, alg_len) == 0) |
| alg = JWS_ALG_NONE; |
| return alg; |
| } |
| |
| if (alg == JWT_ALG_DEFAULT) { |
| switch(*alg_str++) { |
| case 'H': |
| if (strncmp(alg_str, "S256", alg_len-1) == 0) |
| alg = JWS_ALG_HS256; |
| else if (strncmp(alg_str, "S384", alg_len-1) == 0) |
| alg = JWS_ALG_HS384; |
| else if (strncmp(alg_str, "S512", alg_len-1) == 0) |
| alg = JWS_ALG_HS512; |
| break; |
| case 'R': |
| if (strncmp(alg_str, "S256", alg_len-1) == 0) |
| alg = JWS_ALG_RS256; |
| else if (strncmp(alg_str, "S384", alg_len-1) == 0) |
| alg = JWS_ALG_RS384; |
| else if (strncmp(alg_str, "S512", alg_len-1) == 0) |
| alg = JWS_ALG_RS512; |
| break; |
| case 'E': |
| if (strncmp(alg_str, "S256", alg_len-1) == 0) |
| alg = JWS_ALG_ES256; |
| else if (strncmp(alg_str, "S384", alg_len-1) == 0) |
| alg = JWS_ALG_ES384; |
| else if (strncmp(alg_str, "S512", alg_len-1) == 0) |
| alg = JWS_ALG_ES512; |
| break; |
| case 'P': |
| if (strncmp(alg_str, "S256", alg_len-1) == 0) |
| alg = JWS_ALG_PS256; |
| else if (strncmp(alg_str, "S384", alg_len-1) == 0) |
| alg = JWS_ALG_PS384; |
| else if (strncmp(alg_str, "S512", alg_len-1) == 0) |
| alg = JWS_ALG_PS512; |
| break; |
| default: |
| break; |
| } |
| } |
| |
| return alg; |
| } |
| |
| /* |
| * Split a JWT into its separate dot-separated parts. |
| * Since only JWS following the Compact Serialization format are managed for |
| * now, we don't need to manage more than three subparts in the tokens. |
| * See section 3.1 of RFC7515 for more information about JWS Compact |
| * Serialization. |
| * Returns 0 in case of success. |
| */ |
| int jwt_tokenize(const struct buffer *jwt, struct jwt_item *items, unsigned int *item_num) |
| { |
| char *ptr = jwt->area; |
| char *jwt_end = jwt->area + jwt->data; |
| unsigned int index = 0; |
| unsigned int length = 0; |
| |
| if (index < *item_num) { |
| items[index].start = ptr; |
| items[index].length = 0; |
| } |
| |
| while (index < *item_num && ptr < jwt_end) { |
| if (*ptr++ == '.') { |
| items[index++].length = length; |
| |
| if (index == *item_num) |
| return -1; |
| items[index].start = ptr; |
| items[index].length = 0; |
| length = 0; |
| } else |
| ++length; |
| } |
| |
| if (index < *item_num) |
| items[index].length = length; |
| |
| *item_num = (index+1); |
| |
| return (ptr != jwt_end); |
| } |
| |
| /* |
| * Parse a public certificate and insert it into the jwt_cert_tree. |
| * Returns 0 in case of success. |
| */ |
| int jwt_tree_load_cert(char *path, int pathlen, char **err) |
| { |
| int retval = -1; |
| struct jwt_cert_tree_entry *entry = NULL; |
| EVP_PKEY *pkey = NULL; |
| BIO *bio = NULL; |
| |
| bio = BIO_new(BIO_s_file()); |
| if (!bio) { |
| memprintf(err, "%sunable to allocate memory (BIO).\n", err && *err ? *err : ""); |
| goto end; |
| } |
| |
| if (BIO_read_filename(bio, path) == 1) { |
| |
| pkey = PEM_read_bio_PUBKEY(bio, NULL, NULL, NULL); |
| |
| if (!pkey) { |
| memprintf(err, "%sfile not found (%s)\n", err && *err ? *err : "", path); |
| goto end; |
| } |
| |
| entry = calloc(1, sizeof(*entry) + pathlen + 1); |
| if (!entry) { |
| memprintf(err, "%sunable to allocate memory (jwt_cert_tree_entry).\n", err && *err ? *err : ""); |
| goto end; |
| } |
| |
| memcpy(entry->path, path, pathlen + 1); |
| entry->pkey = pkey; |
| |
| ebst_insert(&jwt_cert_tree, &entry->node); |
| retval = 0; |
| } |
| |
| end: |
| BIO_free(bio); |
| return retval; |
| } |
| #endif /* USE_OPENSSL */ |