You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rsa_utils.go 2.9KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107
  1. package jwt
  2. import (
  3. "crypto/rsa"
  4. "crypto/x509"
  5. "encoding/pem"
  6. "errors"
  7. )
  8. var (
  9. ErrKeyMustBePEMEncoded = errors.New("invalid key: Key must be a PEM encoded PKCS1 or PKCS8 key")
  10. ErrNotRSAPrivateKey = errors.New("key is not a valid RSA private key")
  11. ErrNotRSAPublicKey = errors.New("key is not a valid RSA public key")
  12. )
  13. // ParseRSAPrivateKeyFromPEM parses a PEM encoded PKCS1 or PKCS8 private key
  14. func ParseRSAPrivateKeyFromPEM(key []byte) (*rsa.PrivateKey, error) {
  15. var err error
  16. // Parse PEM block
  17. var block *pem.Block
  18. if block, _ = pem.Decode(key); block == nil {
  19. return nil, ErrKeyMustBePEMEncoded
  20. }
  21. var parsedKey interface{}
  22. if parsedKey, err = x509.ParsePKCS1PrivateKey(block.Bytes); err != nil {
  23. if parsedKey, err = x509.ParsePKCS8PrivateKey(block.Bytes); err != nil {
  24. return nil, err
  25. }
  26. }
  27. var pkey *rsa.PrivateKey
  28. var ok bool
  29. if pkey, ok = parsedKey.(*rsa.PrivateKey); !ok {
  30. return nil, ErrNotRSAPrivateKey
  31. }
  32. return pkey, nil
  33. }
  34. // ParseRSAPrivateKeyFromPEMWithPassword parses a PEM encoded PKCS1 or PKCS8 private key protected with password
  35. //
  36. // Deprecated: This function is deprecated and should not be used anymore. It uses the deprecated x509.DecryptPEMBlock
  37. // function, which was deprecated since RFC 1423 is regarded insecure by design. Unfortunately, there is no alternative
  38. // in the Go standard library for now. See https://github.com/golang/go/issues/8860.
  39. func ParseRSAPrivateKeyFromPEMWithPassword(key []byte, password string) (*rsa.PrivateKey, error) {
  40. var err error
  41. // Parse PEM block
  42. var block *pem.Block
  43. if block, _ = pem.Decode(key); block == nil {
  44. return nil, ErrKeyMustBePEMEncoded
  45. }
  46. var parsedKey interface{}
  47. var blockDecrypted []byte
  48. if blockDecrypted, err = x509.DecryptPEMBlock(block, []byte(password)); err != nil {
  49. return nil, err
  50. }
  51. if parsedKey, err = x509.ParsePKCS1PrivateKey(blockDecrypted); err != nil {
  52. if parsedKey, err = x509.ParsePKCS8PrivateKey(blockDecrypted); err != nil {
  53. return nil, err
  54. }
  55. }
  56. var pkey *rsa.PrivateKey
  57. var ok bool
  58. if pkey, ok = parsedKey.(*rsa.PrivateKey); !ok {
  59. return nil, ErrNotRSAPrivateKey
  60. }
  61. return pkey, nil
  62. }
  63. // ParseRSAPublicKeyFromPEM parses a certificate or a PEM encoded PKCS1 or PKIX public key
  64. func ParseRSAPublicKeyFromPEM(key []byte) (*rsa.PublicKey, error) {
  65. var err error
  66. // Parse PEM block
  67. var block *pem.Block
  68. if block, _ = pem.Decode(key); block == nil {
  69. return nil, ErrKeyMustBePEMEncoded
  70. }
  71. // Parse the key
  72. var parsedKey interface{}
  73. if parsedKey, err = x509.ParsePKIXPublicKey(block.Bytes); err != nil {
  74. if cert, err := x509.ParseCertificate(block.Bytes); err == nil {
  75. parsedKey = cert.PublicKey
  76. } else {
  77. if parsedKey, err = x509.ParsePKCS1PublicKey(block.Bytes); err != nil {
  78. return nil, err
  79. }
  80. }
  81. }
  82. var pkey *rsa.PublicKey
  83. var ok bool
  84. if pkey, ok = parsedKey.(*rsa.PublicKey); !ok {
  85. return nil, ErrNotRSAPublicKey
  86. }
  87. return pkey, nil
  88. }