xref: /aosp_15_r20/external/libwebsockets/lib/tls/lws-gencrypto-common.c (revision 1c60b9aca93fdbc9b5f19b2d2194c91294b22281)
1*1c60b9acSAndroid Build Coastguard Worker /*
2*1c60b9acSAndroid Build Coastguard Worker  * libwebsockets - small server side websockets and web server implementation
3*1c60b9acSAndroid Build Coastguard Worker  *
4*1c60b9acSAndroid Build Coastguard Worker  * Copyright (C) 2010 - 2019 Andy Green <[email protected]>
5*1c60b9acSAndroid Build Coastguard Worker  *
6*1c60b9acSAndroid Build Coastguard Worker  * Permission is hereby granted, free of charge, to any person obtaining a copy
7*1c60b9acSAndroid Build Coastguard Worker  * of this software and associated documentation files (the "Software"), to
8*1c60b9acSAndroid Build Coastguard Worker  * deal in the Software without restriction, including without limitation the
9*1c60b9acSAndroid Build Coastguard Worker  * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
10*1c60b9acSAndroid Build Coastguard Worker  * sell copies of the Software, and to permit persons to whom the Software is
11*1c60b9acSAndroid Build Coastguard Worker  * furnished to do so, subject to the following conditions:
12*1c60b9acSAndroid Build Coastguard Worker  *
13*1c60b9acSAndroid Build Coastguard Worker  * The above copyright notice and this permission notice shall be included in
14*1c60b9acSAndroid Build Coastguard Worker  * all copies or substantial portions of the Software.
15*1c60b9acSAndroid Build Coastguard Worker  *
16*1c60b9acSAndroid Build Coastguard Worker  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17*1c60b9acSAndroid Build Coastguard Worker  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18*1c60b9acSAndroid Build Coastguard Worker  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19*1c60b9acSAndroid Build Coastguard Worker  * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20*1c60b9acSAndroid Build Coastguard Worker  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
21*1c60b9acSAndroid Build Coastguard Worker  * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
22*1c60b9acSAndroid Build Coastguard Worker  * IN THE SOFTWARE.
23*1c60b9acSAndroid Build Coastguard Worker  */
24*1c60b9acSAndroid Build Coastguard Worker 
25*1c60b9acSAndroid Build Coastguard Worker #include "private-lib-core.h"
26*1c60b9acSAndroid Build Coastguard Worker 
27*1c60b9acSAndroid Build Coastguard Worker /*
28*1c60b9acSAndroid Build Coastguard Worker  * These came from RFC7518 (JSON Web Algorithms) Section 3
29*1c60b9acSAndroid Build Coastguard Worker  *
30*1c60b9acSAndroid Build Coastguard Worker  * Cryptographic Algorithms for Digital Signatures and MACs
31*1c60b9acSAndroid Build Coastguard Worker  */
32*1c60b9acSAndroid Build Coastguard Worker 
33*1c60b9acSAndroid Build Coastguard Worker static const struct lws_jose_jwe_alg lws_gencrypto_jws_alg_map[] = {
34*1c60b9acSAndroid Build Coastguard Worker 
35*1c60b9acSAndroid Build Coastguard Worker 	/*
36*1c60b9acSAndroid Build Coastguard Worker 	 * JWSs MAY also be created that do not provide integrity protection.
37*1c60b9acSAndroid Build Coastguard Worker 	 * Such a JWS is called an Unsecured JWS.  An Unsecured JWS uses the
38*1c60b9acSAndroid Build Coastguard Worker 	 * "alg" value "none" and is formatted identically to other JWSs, but
39*1c60b9acSAndroid Build Coastguard Worker 	 * MUST use the empty octet sequence as its JWS Signature value.
40*1c60b9acSAndroid Build Coastguard Worker 	 * Recipients MUST verify that the JWS Signature value is the empty
41*1c60b9acSAndroid Build Coastguard Worker 	 * octet sequence.
42*1c60b9acSAndroid Build Coastguard Worker 	 *
43*1c60b9acSAndroid Build Coastguard Worker 	 * Implementations that support Unsecured JWSs MUST NOT accept such
44*1c60b9acSAndroid Build Coastguard Worker 	 * objects as valid unless the application specifies that it is
45*1c60b9acSAndroid Build Coastguard Worker 	 * acceptable for a specific object to not be integrity protected.
46*1c60b9acSAndroid Build Coastguard Worker 	 * Implementations MUST NOT accept Unsecured JWSs by default.  In order
47*1c60b9acSAndroid Build Coastguard Worker 	 * to mitigate downgrade attacks, applications MUST NOT signal
48*1c60b9acSAndroid Build Coastguard Worker 	 * acceptance of Unsecured JWSs at a global level, and SHOULD signal
49*1c60b9acSAndroid Build Coastguard Worker 	 * acceptance on a per-object basis.  See Section 8.5 for security
50*1c60b9acSAndroid Build Coastguard Worker 	 * considerations associated with using this algorithm.
51*1c60b9acSAndroid Build Coastguard Worker 	 */
52*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional */
53*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
54*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
55*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
56*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
57*1c60b9acSAndroid Build Coastguard Worker 		"none", NULL, 0, 0, 0
58*1c60b9acSAndroid Build Coastguard Worker 	},
59*1c60b9acSAndroid Build Coastguard Worker 
60*1c60b9acSAndroid Build Coastguard Worker 	/*
61*1c60b9acSAndroid Build Coastguard Worker 	 * HMAC with SHA-2 Functions
62*1c60b9acSAndroid Build Coastguard Worker 	 *
63*1c60b9acSAndroid Build Coastguard Worker 	 * The HMAC SHA-256 MAC for a JWS is validated by computing an HMAC
64*1c60b9acSAndroid Build Coastguard Worker 	 * value per RFC 2104, using SHA-256 as the hash algorithm "H", using
65*1c60b9acSAndroid Build Coastguard Worker 	 * the received JWS Signing Input as the "text" value, and using the
66*1c60b9acSAndroid Build Coastguard Worker 	 * shared key.  This computed HMAC value is then compared to the result
67*1c60b9acSAndroid Build Coastguard Worker 	 * of base64url decoding the received encoded JWS Signature value.  The
68*1c60b9acSAndroid Build Coastguard Worker 	 * comparison of the computed HMAC value to the JWS Signature value MUST
69*1c60b9acSAndroid Build Coastguard Worker 	 * be done in a constant-time manner to thwart timing attacks.
70*1c60b9acSAndroid Build Coastguard Worker 	 *
71*1c60b9acSAndroid Build Coastguard Worker 	 * Alternatively, the computed HMAC value can be base64url encoded and
72*1c60b9acSAndroid Build Coastguard Worker 	 * compared to the received encoded JWS Signature value (also in a
73*1c60b9acSAndroid Build Coastguard Worker 	 * constant-time manner), as this comparison produces the same result as
74*1c60b9acSAndroid Build Coastguard Worker 	 * comparing the unencoded values.  In either case, if the values match,
75*1c60b9acSAndroid Build Coastguard Worker 	 * the HMAC has been validated.
76*1c60b9acSAndroid Build Coastguard Worker 	 */
77*1c60b9acSAndroid Build Coastguard Worker 
78*1c60b9acSAndroid Build Coastguard Worker 	{	/* required: HMAC using SHA-256 */
79*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
80*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_SHA256,
81*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
82*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
83*1c60b9acSAndroid Build Coastguard Worker 		"HS256", NULL, 0, 0, 0
84*1c60b9acSAndroid Build Coastguard Worker 	},
85*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: HMAC using SHA-384 */
86*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
87*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_SHA384,
88*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
89*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
90*1c60b9acSAndroid Build Coastguard Worker 		"HS384", NULL, 0, 0, 0
91*1c60b9acSAndroid Build Coastguard Worker 	},
92*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: HMAC using SHA-512 */
93*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
94*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_SHA512,
95*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
96*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
97*1c60b9acSAndroid Build Coastguard Worker 		"HS512", NULL, 0, 0, 0
98*1c60b9acSAndroid Build Coastguard Worker 	},
99*1c60b9acSAndroid Build Coastguard Worker 
100*1c60b9acSAndroid Build Coastguard Worker 	/*
101*1c60b9acSAndroid Build Coastguard Worker 	 * Digital Signature with RSASSA-PKCS1-v1_5
102*1c60b9acSAndroid Build Coastguard Worker 	 *
103*1c60b9acSAndroid Build Coastguard Worker 	 * This section defines the use of the RSASSA-PKCS1-v1_5 digital
104*1c60b9acSAndroid Build Coastguard Worker 	 * signature algorithm as defined in Section 8.2 of RFC 3447 [RFC3447]
105*1c60b9acSAndroid Build Coastguard Worker 	 * (commonly known as PKCS #1), using SHA-2 [SHS] hash functions.
106*1c60b9acSAndroid Build Coastguard Worker 	 *
107*1c60b9acSAndroid Build Coastguard Worker 	 * A key of size 2048 bits or larger MUST be used with these algorithms.
108*1c60b9acSAndroid Build Coastguard Worker 	 *
109*1c60b9acSAndroid Build Coastguard Worker 	 * The RSASSA-PKCS1-v1_5 SHA-256 digital signature is generated as
110*1c60b9acSAndroid Build Coastguard Worker 	 * follows: generate a digital signature of the JWS Signing Input using
111*1c60b9acSAndroid Build Coastguard Worker 	 * RSASSA-PKCS1-v1_5-SIGN and the SHA-256 hash function with the desired
112*1c60b9acSAndroid Build Coastguard Worker 	 * private key.  This is the JWS Signature value.
113*1c60b9acSAndroid Build Coastguard Worker 	 *
114*1c60b9acSAndroid Build Coastguard Worker 	 * The RSASSA-PKCS1-v1_5 SHA-256 digital signature for a JWS is
115*1c60b9acSAndroid Build Coastguard Worker 	 * validated as follows: submit the JWS Signing Input, the JWS
116*1c60b9acSAndroid Build Coastguard Worker 	 * Signature, and the public key corresponding to the private key used
117*1c60b9acSAndroid Build Coastguard Worker 	 * by the signer to the RSASSA-PKCS1-v1_5-VERIFY algorithm using SHA-256
118*1c60b9acSAndroid Build Coastguard Worker 	 * as the hash function.
119*1c60b9acSAndroid Build Coastguard Worker 	 */
120*1c60b9acSAndroid Build Coastguard Worker 
121*1c60b9acSAndroid Build Coastguard Worker 	{	/* recommended: RSASSA-PKCS1-v1_5 using SHA-256 */
122*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA256,
123*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
124*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_RSASSA_PKCS1_1_5,
125*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
126*1c60b9acSAndroid Build Coastguard Worker 		"RS256", NULL, 2048, 4096, 0
127*1c60b9acSAndroid Build Coastguard Worker 	},
128*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: RSASSA-PKCS1-v1_5 using SHA-384 */
129*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA384,
130*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
131*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_RSASSA_PKCS1_1_5,
132*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
133*1c60b9acSAndroid Build Coastguard Worker 		"RS384", NULL, 2048, 4096, 0
134*1c60b9acSAndroid Build Coastguard Worker 	},
135*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: RSASSA-PKCS1-v1_5 using SHA-512 */
136*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA512,
137*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
138*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_RSASSA_PKCS1_1_5,
139*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
140*1c60b9acSAndroid Build Coastguard Worker 		"RS512", NULL, 2048, 4096, 0
141*1c60b9acSAndroid Build Coastguard Worker 	},
142*1c60b9acSAndroid Build Coastguard Worker 
143*1c60b9acSAndroid Build Coastguard Worker 	/*
144*1c60b9acSAndroid Build Coastguard Worker 	 * Digital Signature with ECDSA
145*1c60b9acSAndroid Build Coastguard Worker 	 *
146*1c60b9acSAndroid Build Coastguard Worker 	 * The ECDSA P-256 SHA-256 digital signature is generated as follows:
147*1c60b9acSAndroid Build Coastguard Worker 	 *
148*1c60b9acSAndroid Build Coastguard Worker 	 * 1.  Generate a digital signature of the JWS Signing Input using ECDSA
149*1c60b9acSAndroid Build Coastguard Worker 	 *     P-256 SHA-256 with the desired private key.  The output will be
150*1c60b9acSAndroid Build Coastguard Worker 	 *     the pair (R, S), where R and S are 256-bit unsigned integers.
151*1c60b9acSAndroid Build Coastguard Worker 	 * 2.  Turn R and S into octet sequences in big-endian order, with each
152*1c60b9acSAndroid Build Coastguard Worker 	 *     array being be 32 octets long.  The octet sequence
153*1c60b9acSAndroid Build Coastguard Worker 	 *     representations MUST NOT be shortened to omit any leading zero
154*1c60b9acSAndroid Build Coastguard Worker 	 *     octets contained in the values.
155*1c60b9acSAndroid Build Coastguard Worker 	 *
156*1c60b9acSAndroid Build Coastguard Worker 	 * 3.  Concatenate the two octet sequences in the order R and then S.
157*1c60b9acSAndroid Build Coastguard Worker 	 *     (Note that many ECDSA implementations will directly produce this
158*1c60b9acSAndroid Build Coastguard Worker 	 *     concatenation as their output.)
159*1c60b9acSAndroid Build Coastguard Worker 	 *
160*1c60b9acSAndroid Build Coastguard Worker 	 * 4.  The resulting 64-octet sequence is the JWS Signature value.
161*1c60b9acSAndroid Build Coastguard Worker 	 *
162*1c60b9acSAndroid Build Coastguard Worker 	 * The ECDSA P-256 SHA-256 digital signature for a JWS is validated as
163*1c60b9acSAndroid Build Coastguard Worker 	 * follows:
164*1c60b9acSAndroid Build Coastguard Worker 	 *
165*1c60b9acSAndroid Build Coastguard Worker 	 * 1.  The JWS Signature value MUST be a 64-octet sequence.  If it is
166*1c60b9acSAndroid Build Coastguard Worker 	 *     not a 64-octet sequence, the validation has failed.
167*1c60b9acSAndroid Build Coastguard Worker 	 *
168*1c60b9acSAndroid Build Coastguard Worker 	 * 2.  Split the 64-octet sequence into two 32-octet sequences.  The
169*1c60b9acSAndroid Build Coastguard Worker 	 *     first octet sequence represents R and the second S.  The values R
170*1c60b9acSAndroid Build Coastguard Worker 	 *     and S are represented as octet sequences using the Integer-to-
171*1c60b9acSAndroid Build Coastguard Worker 	 *     OctetString Conversion defined in Section 2.3.7 of SEC1 [SEC1]
172*1c60b9acSAndroid Build Coastguard Worker 	 *     (in big-endian octet order).
173*1c60b9acSAndroid Build Coastguard Worker 	 * 3.  Submit the JWS Signing Input, R, S, and the public key (x, y) to
174*1c60b9acSAndroid Build Coastguard Worker 	 *     the ECDSA P-256 SHA-256 validator.
175*1c60b9acSAndroid Build Coastguard Worker 	 */
176*1c60b9acSAndroid Build Coastguard Worker 
177*1c60b9acSAndroid Build Coastguard Worker 	{	/* Recommended+: ECDSA using P-256 and SHA-256 */
178*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA256,
179*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
180*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_ECDSA,
181*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
182*1c60b9acSAndroid Build Coastguard Worker 		"ES256", "P-256", 256, 256, 0
183*1c60b9acSAndroid Build Coastguard Worker 	},
184*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: ECDSA using P-384 and SHA-384 */
185*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA384,
186*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
187*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_ECDSA,
188*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
189*1c60b9acSAndroid Build Coastguard Worker 		"ES384", "P-384", 384, 384, 0
190*1c60b9acSAndroid Build Coastguard Worker 	},
191*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: ECDSA using P-521 and SHA-512 */
192*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA512,
193*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
194*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_ECDSA,
195*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
196*1c60b9acSAndroid Build Coastguard Worker 		"ES512", "P-521", 521, 521, 0
197*1c60b9acSAndroid Build Coastguard Worker 	},
198*1c60b9acSAndroid Build Coastguard Worker #if 0
199*1c60b9acSAndroid Build Coastguard Worker 	Not yet supported
200*1c60b9acSAndroid Build Coastguard Worker 
201*1c60b9acSAndroid Build Coastguard Worker 	/*
202*1c60b9acSAndroid Build Coastguard Worker 	 * Digital Signature with RSASSA-PSS
203*1c60b9acSAndroid Build Coastguard Worker 	 *
204*1c60b9acSAndroid Build Coastguard Worker 	 * A key of size 2048 bits or larger MUST be used with this algorithm.
205*1c60b9acSAndroid Build Coastguard Worker 	 *
206*1c60b9acSAndroid Build Coastguard Worker 	 * The RSASSA-PSS SHA-256 digital signature is generated as follows:
207*1c60b9acSAndroid Build Coastguard Worker 	 * generate a digital signature of the JWS Signing Input using RSASSA-
208*1c60b9acSAndroid Build Coastguard Worker 	 * PSS-SIGN, the SHA-256 hash function, and the MGF1 mask generation
209*1c60b9acSAndroid Build Coastguard Worker 	 * function with SHA-256 with the desired private key.  This is the JWS
210*1c60b9acSAndroid Build Coastguard Worker 	 * Signature value.
211*1c60b9acSAndroid Build Coastguard Worker 	 *
212*1c60b9acSAndroid Build Coastguard Worker 	 * The RSASSA-PSS SHA-256 digital signature for a JWS is validated as
213*1c60b9acSAndroid Build Coastguard Worker 	 * follows: submit the JWS Signing Input, the JWS Signature, and the
214*1c60b9acSAndroid Build Coastguard Worker 	 * public key corresponding to the private key used by the signer to the
215*1c60b9acSAndroid Build Coastguard Worker 	 * RSASSA-PSS-VERIFY algorithm using SHA-256 as the hash function and
216*1c60b9acSAndroid Build Coastguard Worker 	 * using MGF1 as the mask generation function with SHA-256.
217*1c60b9acSAndroid Build Coastguard Worker 	 *
218*1c60b9acSAndroid Build Coastguard Worker 	 */
219*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: RSASSA-PSS using SHA-256 and MGF1 with SHA-256 */
220*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA256,
221*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
222*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_RSASSA_PKCS1_PSS,
223*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
224*1c60b9acSAndroid Build Coastguard Worker 		"PS256", NULL, 2048, 4096, 0
225*1c60b9acSAndroid Build Coastguard Worker 	},
226*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: RSASSA-PSS using SHA-384 and MGF1 with SHA-384 */
227*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA384,
228*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
229*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_RSASSA_PKCS1_PSS,
230*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
231*1c60b9acSAndroid Build Coastguard Worker 		"PS384", NULL, 2048, 4096, 0
232*1c60b9acSAndroid Build Coastguard Worker 	},
233*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: RSASSA-PSS using SHA-512 and MGF1 with SHA-512*/
234*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA512,
235*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
236*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_RSASSA_PKCS1_PSS,
237*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
238*1c60b9acSAndroid Build Coastguard Worker 		"PS512", NULL, 2048, 4096, 0
239*1c60b9acSAndroid Build Coastguard Worker 	},
240*1c60b9acSAndroid Build Coastguard Worker #endif
241*1c60b9acSAndroid Build Coastguard Worker 	/* list terminator */
242*1c60b9acSAndroid Build Coastguard Worker 	{ 0, 0, 0, 0, NULL, NULL, 0, 0, 0}
243*1c60b9acSAndroid Build Coastguard Worker };
244*1c60b9acSAndroid Build Coastguard Worker 
245*1c60b9acSAndroid Build Coastguard Worker /*
246*1c60b9acSAndroid Build Coastguard Worker  * These came from RFC7518 (JSON Web Algorithms) Section 4
247*1c60b9acSAndroid Build Coastguard Worker  *
248*1c60b9acSAndroid Build Coastguard Worker  * Cryptographic Algorithms for Key Management
249*1c60b9acSAndroid Build Coastguard Worker  *
250*1c60b9acSAndroid Build Coastguard Worker  * JWE uses cryptographic algorithms to encrypt or determine the Content
251*1c60b9acSAndroid Build Coastguard Worker  * Encryption Key (CEK).
252*1c60b9acSAndroid Build Coastguard Worker  */
253*1c60b9acSAndroid Build Coastguard Worker 
254*1c60b9acSAndroid Build Coastguard Worker static const struct lws_jose_jwe_alg lws_gencrypto_jwe_alg_map[] = {
255*1c60b9acSAndroid Build Coastguard Worker 
256*1c60b9acSAndroid Build Coastguard Worker 	/*
257*1c60b9acSAndroid Build Coastguard Worker 	 * This section defines the specifics of encrypting a JWE CEK with
258*1c60b9acSAndroid Build Coastguard Worker 	 * RSAES-PKCS1-v1_5 [RFC3447].  The "alg" (algorithm) Header Parameter
259*1c60b9acSAndroid Build Coastguard Worker 	 * value "RSA1_5" is used for this algorithm.
260*1c60b9acSAndroid Build Coastguard Worker 	 *
261*1c60b9acSAndroid Build Coastguard Worker 	 * A key of size 2048 bits or larger MUST be used with this algorithm.
262*1c60b9acSAndroid Build Coastguard Worker 	 */
263*1c60b9acSAndroid Build Coastguard Worker 
264*1c60b9acSAndroid Build Coastguard Worker 	{	/* recommended-: RSAES-PKCS1-v1_5 */
265*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA256,
266*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
267*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_RSASSA_PKCS1_1_5,
268*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
269*1c60b9acSAndroid Build Coastguard Worker 		"RSA1_5", NULL, 2048, 4096, 0
270*1c60b9acSAndroid Build Coastguard Worker 	},
271*1c60b9acSAndroid Build Coastguard Worker 	{	/* recommended+: RSAES OAEP using default parameters */
272*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA1,
273*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
274*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_RSASSA_PKCS1_OAEP,
275*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
276*1c60b9acSAndroid Build Coastguard Worker 		"RSA-OAEP", NULL, 2048, 4096, 0
277*1c60b9acSAndroid Build Coastguard Worker 	},
278*1c60b9acSAndroid Build Coastguard Worker 	{	/* recommended+: RSAES OAEP using SHA-256 and MGF1 SHA-256 */
279*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA256,
280*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
281*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_RSASSA_PKCS1_OAEP,
282*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
283*1c60b9acSAndroid Build Coastguard Worker 		"RSA-OAEP-256", NULL, 2048, 4096, 0
284*1c60b9acSAndroid Build Coastguard Worker 	},
285*1c60b9acSAndroid Build Coastguard Worker 
286*1c60b9acSAndroid Build Coastguard Worker 	/*
287*1c60b9acSAndroid Build Coastguard Worker 	 * Key Wrapping with AES Key Wrap
288*1c60b9acSAndroid Build Coastguard Worker 	 *
289*1c60b9acSAndroid Build Coastguard Worker 	 * This section defines the specifics of encrypting a JWE CEK with the
290*1c60b9acSAndroid Build Coastguard Worker 	 * Advanced Encryption Standard (AES) Key Wrap Algorithm [RFC3394] using
291*1c60b9acSAndroid Build Coastguard Worker 	 * the default initial value specified in Section 2.2.3.1 of that
292*1c60b9acSAndroid Build Coastguard Worker 	 * document.
293*1c60b9acSAndroid Build Coastguard Worker 	 *
294*1c60b9acSAndroid Build Coastguard Worker 	 *
295*1c60b9acSAndroid Build Coastguard Worker 	 */
296*1c60b9acSAndroid Build Coastguard Worker 	{	/* recommended: AES Key Wrap with AES Key Wrap with defaults
297*1c60b9acSAndroid Build Coastguard Worker 				using 128-bit key  */
298*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
299*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
300*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_ECB,
301*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
302*1c60b9acSAndroid Build Coastguard Worker 		"A128KW", NULL, 128, 128, 64
303*1c60b9acSAndroid Build Coastguard Worker 	},
304*1c60b9acSAndroid Build Coastguard Worker 
305*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: AES Key Wrap with AES Key Wrap with defaults
306*1c60b9acSAndroid Build Coastguard Worker 				using 192-bit key */
307*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
308*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
309*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_ECB,
310*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
311*1c60b9acSAndroid Build Coastguard Worker 		"A192KW", NULL, 192, 192, 64
312*1c60b9acSAndroid Build Coastguard Worker 	},
313*1c60b9acSAndroid Build Coastguard Worker 
314*1c60b9acSAndroid Build Coastguard Worker 	{	/* recommended: AES Key Wrap with AES Key Wrap with defaults
315*1c60b9acSAndroid Build Coastguard Worker 				using 256-bit key */
316*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
317*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
318*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_ECB,
319*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
320*1c60b9acSAndroid Build Coastguard Worker 		"A256KW", NULL, 256, 256, 64
321*1c60b9acSAndroid Build Coastguard Worker 	},
322*1c60b9acSAndroid Build Coastguard Worker 
323*1c60b9acSAndroid Build Coastguard Worker 	/*
324*1c60b9acSAndroid Build Coastguard Worker 	 * This section defines the specifics of directly performing symmetric
325*1c60b9acSAndroid Build Coastguard Worker 	 * key encryption without performing a key wrapping step.  In this case,
326*1c60b9acSAndroid Build Coastguard Worker 	 * the shared symmetric key is used directly as the Content Encryption
327*1c60b9acSAndroid Build Coastguard Worker 	 * Key (CEK) value for the "enc" algorithm.  An empty octet sequence is
328*1c60b9acSAndroid Build Coastguard Worker 	 * used as the JWE Encrypted Key value.  The "alg" (algorithm) Header
329*1c60b9acSAndroid Build Coastguard Worker 	 * Parameter value "dir" is used in this case.
330*1c60b9acSAndroid Build Coastguard Worker 	 */
331*1c60b9acSAndroid Build Coastguard Worker 	{	/* recommended */
332*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
333*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
334*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
335*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
336*1c60b9acSAndroid Build Coastguard Worker 		"dir", NULL, 0, 0, 0
337*1c60b9acSAndroid Build Coastguard Worker 	},
338*1c60b9acSAndroid Build Coastguard Worker 
339*1c60b9acSAndroid Build Coastguard Worker 	/*
340*1c60b9acSAndroid Build Coastguard Worker 	 * Key Agreement with Elliptic Curve Diffie-Hellman Ephemeral Static
341*1c60b9acSAndroid Build Coastguard Worker 	 * (ECDH-ES)
342*1c60b9acSAndroid Build Coastguard Worker 	 *
343*1c60b9acSAndroid Build Coastguard Worker 	 * This section defines the specifics of key agreement with Elliptic
344*1c60b9acSAndroid Build Coastguard Worker 	 * Curve Diffie-Hellman Ephemeral Static [RFC6090], in combination with
345*1c60b9acSAndroid Build Coastguard Worker 	 * the Concat KDF, as defined in Section 5.8.1 of [NIST.800-56A].  The
346*1c60b9acSAndroid Build Coastguard Worker 	 * key agreement result can be used in one of two ways:
347*1c60b9acSAndroid Build Coastguard Worker 	 *
348*1c60b9acSAndroid Build Coastguard Worker 	 * 1.  directly as the Content Encryption Key (CEK) for the "enc"
349*1c60b9acSAndroid Build Coastguard Worker 	 *     algorithm, in the Direct Key Agreement mode, or
350*1c60b9acSAndroid Build Coastguard Worker 	 *
351*1c60b9acSAndroid Build Coastguard Worker 	 * 2.  as a symmetric key used to wrap the CEK with the "A128KW",
352*1c60b9acSAndroid Build Coastguard Worker 	 *     "A192KW", or "A256KW" algorithms, in the Key Agreement with Key
353*1c60b9acSAndroid Build Coastguard Worker 	 *     Wrapping mode.
354*1c60b9acSAndroid Build Coastguard Worker 	 *
355*1c60b9acSAndroid Build Coastguard Worker 	 * A new ephemeral public key value MUST be generated for each key
356*1c60b9acSAndroid Build Coastguard Worker 	 * agreement operation.
357*1c60b9acSAndroid Build Coastguard Worker 	 *
358*1c60b9acSAndroid Build Coastguard Worker 	 * In Direct Key Agreement mode, the output of the Concat KDF MUST be a
359*1c60b9acSAndroid Build Coastguard Worker 	 * key of the same length as that used by the "enc" algorithm.  In this
360*1c60b9acSAndroid Build Coastguard Worker 	 * case, the empty octet sequence is used as the JWE Encrypted Key
361*1c60b9acSAndroid Build Coastguard Worker 	 * value.  The "alg" (algorithm) Header Parameter value "ECDH-ES" is
362*1c60b9acSAndroid Build Coastguard Worker 	 * used in the Direct Key Agreement mode.
363*1c60b9acSAndroid Build Coastguard Worker 	 *
364*1c60b9acSAndroid Build Coastguard Worker 	 * In Key Agreement with Key Wrapping mode, the output of the Concat KDF
365*1c60b9acSAndroid Build Coastguard Worker 	 * MUST be a key of the length needed for the specified key wrapping
366*1c60b9acSAndroid Build Coastguard Worker 	 * algorithm.  In this case, the JWE Encrypted Key is the CEK wrapped
367*1c60b9acSAndroid Build Coastguard Worker 	 * with the agreed-upon key.
368*1c60b9acSAndroid Build Coastguard Worker 	 */
369*1c60b9acSAndroid Build Coastguard Worker 
370*1c60b9acSAndroid Build Coastguard Worker 	{	/* recommended+: ECDH Ephemeral Static Key agreement Concat KDF */
371*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA256,
372*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
373*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_ECDHES,
374*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
375*1c60b9acSAndroid Build Coastguard Worker 		"ECDH-ES", NULL, 128, 128, 0
376*1c60b9acSAndroid Build Coastguard Worker 	},
377*1c60b9acSAndroid Build Coastguard Worker 	{	/* recommended: ECDH-ES + Concat KDF + wrapped by AES128KW */
378*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA256,
379*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
380*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_ECDHES,
381*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_ECB,
382*1c60b9acSAndroid Build Coastguard Worker 		"ECDH-ES+A128KW", NULL, 128, 128, 0
383*1c60b9acSAndroid Build Coastguard Worker 	},
384*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: ECDH-ES + Concat KDF + wrapped by AES192KW */
385*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA256,
386*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
387*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_ECDHES,
388*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_ECB,
389*1c60b9acSAndroid Build Coastguard Worker 		"ECDH-ES+A192KW", NULL, 192, 192, 0
390*1c60b9acSAndroid Build Coastguard Worker 	},
391*1c60b9acSAndroid Build Coastguard Worker 	{	/* recommended: ECDH-ES + Concat KDF + wrapped by AES256KW */
392*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_SHA256,
393*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
394*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_ECDHES,
395*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_ECB,
396*1c60b9acSAndroid Build Coastguard Worker 		"ECDH-ES+A256KW", NULL, 256, 256, 0
397*1c60b9acSAndroid Build Coastguard Worker 	},
398*1c60b9acSAndroid Build Coastguard Worker 
399*1c60b9acSAndroid Build Coastguard Worker 	/*
400*1c60b9acSAndroid Build Coastguard Worker 	 * Key Encryption with AES GCM
401*1c60b9acSAndroid Build Coastguard Worker 	 *
402*1c60b9acSAndroid Build Coastguard Worker 	 *  This section defines the specifics of encrypting a JWE Content
403*1c60b9acSAndroid Build Coastguard Worker 	 *  Encryption Key (CEK) with Advanced Encryption Standard (AES) in
404*1c60b9acSAndroid Build Coastguard Worker 	 *  Galois/Counter Mode (GCM) ([AES] and [NIST.800-38D]).
405*1c60b9acSAndroid Build Coastguard Worker 	 *
406*1c60b9acSAndroid Build Coastguard Worker 	 * Use of an Initialization Vector (IV) of size 96 bits is REQUIRED with
407*1c60b9acSAndroid Build Coastguard Worker 	 * this algorithm.  The IV is represented in base64url-encoded form as
408*1c60b9acSAndroid Build Coastguard Worker 	 * the "iv" (initialization vector) Header Parameter value.
409*1c60b9acSAndroid Build Coastguard Worker 	 *
410*1c60b9acSAndroid Build Coastguard Worker 	 * The Additional Authenticated Data value used is the empty octet
411*1c60b9acSAndroid Build Coastguard Worker 	 * string.
412*1c60b9acSAndroid Build Coastguard Worker 	 *
413*1c60b9acSAndroid Build Coastguard Worker 	 * The requested size of the Authentication Tag output MUST be 128 bits,
414*1c60b9acSAndroid Build Coastguard Worker 	 * regardless of the key size.
415*1c60b9acSAndroid Build Coastguard Worker 	 *
416*1c60b9acSAndroid Build Coastguard Worker 	 * The JWE Encrypted Key value is the ciphertext output.
417*1c60b9acSAndroid Build Coastguard Worker 	 *
418*1c60b9acSAndroid Build Coastguard Worker 	 * The Authentication Tag output is represented in base64url-encoded
419*1c60b9acSAndroid Build Coastguard Worker 	 * form as the "tag" (authentication tag) Header Parameter value.
420*1c60b9acSAndroid Build Coastguard Worker 	 *
421*1c60b9acSAndroid Build Coastguard Worker 	 *
422*1c60b9acSAndroid Build Coastguard Worker 	 * "iv" (Initialization Vector) Header Parameter
423*1c60b9acSAndroid Build Coastguard Worker 	 *
424*1c60b9acSAndroid Build Coastguard Worker 	 * The "iv" (initialization vector) Header Parameter value is the
425*1c60b9acSAndroid Build Coastguard Worker 	 * base64url-encoded representation of the 96-bit IV value used for the
426*1c60b9acSAndroid Build Coastguard Worker 	 * key encryption operation.  This Header Parameter MUST be present and
427*1c60b9acSAndroid Build Coastguard Worker 	 * MUST be understood and processed by implementations when these
428*1c60b9acSAndroid Build Coastguard Worker 	 * algorithms are used.
429*1c60b9acSAndroid Build Coastguard Worker 	 *
430*1c60b9acSAndroid Build Coastguard Worker 	 * "tag" (Authentication Tag) Header Parameter
431*1c60b9acSAndroid Build Coastguard Worker 	 *
432*1c60b9acSAndroid Build Coastguard Worker 	 * The "tag" (authentication tag) Header Parameter value is the
433*1c60b9acSAndroid Build Coastguard Worker 	 * base64url-encoded representation of the 128-bit Authentication Tag
434*1c60b9acSAndroid Build Coastguard Worker 	 * value resulting from the key encryption operation.  This Header
435*1c60b9acSAndroid Build Coastguard Worker 	 * Parameter MUST be present and MUST be understood and processed by
436*1c60b9acSAndroid Build Coastguard Worker 	 * implementations when these algorithms are used.
437*1c60b9acSAndroid Build Coastguard Worker 	 */
438*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: Key wrapping with AES GCM using 128-bit key  */
439*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
440*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
441*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_ECB,
442*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
443*1c60b9acSAndroid Build Coastguard Worker 		"A128GCMKW", NULL, 128, 128, 96
444*1c60b9acSAndroid Build Coastguard Worker 	},
445*1c60b9acSAndroid Build Coastguard Worker 
446*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: Key wrapping with AES GCM using 192-bit key */
447*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
448*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
449*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_ECB,
450*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
451*1c60b9acSAndroid Build Coastguard Worker 		"A192GCMKW", NULL, 192, 192, 96
452*1c60b9acSAndroid Build Coastguard Worker 	},
453*1c60b9acSAndroid Build Coastguard Worker 
454*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: Key wrapping with AES GCM using 256-bit key */
455*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
456*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
457*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_ECB,
458*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
459*1c60b9acSAndroid Build Coastguard Worker 		"A256GCMKW", NULL, 256, 256, 96
460*1c60b9acSAndroid Build Coastguard Worker 	},
461*1c60b9acSAndroid Build Coastguard Worker 
462*1c60b9acSAndroid Build Coastguard Worker 	/* list terminator */
463*1c60b9acSAndroid Build Coastguard Worker 	{ 0, 0, 0, 0, NULL, NULL, 0, 0, 0 }
464*1c60b9acSAndroid Build Coastguard Worker };
465*1c60b9acSAndroid Build Coastguard Worker 
466*1c60b9acSAndroid Build Coastguard Worker /*
467*1c60b9acSAndroid Build Coastguard Worker  * The "enc" (encryption algorithm) Header Parameter identifies the
468*1c60b9acSAndroid Build Coastguard Worker  * content encryption algorithm used to perform authenticated encryption
469*1c60b9acSAndroid Build Coastguard Worker  * on the plaintext to produce the ciphertext and the Authentication
470*1c60b9acSAndroid Build Coastguard Worker  * Tag.  This algorithm MUST be an AEAD algorithm with a specified key
471*1c60b9acSAndroid Build Coastguard Worker  * length.  The encrypted content is not usable if the "enc" value does
472*1c60b9acSAndroid Build Coastguard Worker  * not represent a supported algorithm.  "enc" values should either be
473*1c60b9acSAndroid Build Coastguard Worker  * registered in the IANA "JSON Web Signature and Encryption Algorithms"
474*1c60b9acSAndroid Build Coastguard Worker  * registry established by [JWA] or be a value that contains a
475*1c60b9acSAndroid Build Coastguard Worker  * Collision-Resistant Name.  The "enc" value is a case-sensitive ASCII
476*1c60b9acSAndroid Build Coastguard Worker  * string containing a StringOrURI value.  This Header Parameter MUST be
477*1c60b9acSAndroid Build Coastguard Worker  * present and MUST be understood and processed by implementations.
478*1c60b9acSAndroid Build Coastguard Worker  */
479*1c60b9acSAndroid Build Coastguard Worker 
480*1c60b9acSAndroid Build Coastguard Worker static const struct lws_jose_jwe_alg lws_gencrypto_jwe_enc_map[] = {
481*1c60b9acSAndroid Build Coastguard Worker 	/*
482*1c60b9acSAndroid Build Coastguard Worker 	 * AES_128_CBC_HMAC_SHA_256 / 512
483*1c60b9acSAndroid Build Coastguard Worker 	 *
484*1c60b9acSAndroid Build Coastguard Worker 	 * It uses the HMAC message authentication code [RFC2104] with the
485*1c60b9acSAndroid Build Coastguard Worker 	 * SHA-256 hash function [SHS] to provide message authentication, with
486*1c60b9acSAndroid Build Coastguard Worker 	 * the HMAC output truncated to 128 bits, corresponding to the
487*1c60b9acSAndroid Build Coastguard Worker 	 * HMAC-SHA-256-128 algorithm defined in [RFC4868].  For encryption, it
488*1c60b9acSAndroid Build Coastguard Worker 	 * uses AES in the CBC mode of operation as defined in Section 6.2 of
489*1c60b9acSAndroid Build Coastguard Worker 	 * [NIST.800-38A], with PKCS #7 padding and a 128-bit IV value.
490*1c60b9acSAndroid Build Coastguard Worker 	 *
491*1c60b9acSAndroid Build Coastguard Worker 	 * The AES_CBC_HMAC_SHA2 parameters specific to AES_128_CBC_HMAC_SHA_256
492*1c60b9acSAndroid Build Coastguard Worker 	 * are:
493*1c60b9acSAndroid Build Coastguard Worker 	 *
494*1c60b9acSAndroid Build Coastguard Worker 	 * The input key K is 32 octets long.
495*1c60b9acSAndroid Build Coastguard Worker 	 *       ENC_KEY_LEN is 16 octets.
496*1c60b9acSAndroid Build Coastguard Worker 	 *       MAC_KEY_LEN is 16 octets.
497*1c60b9acSAndroid Build Coastguard Worker 	 *       The SHA-256 hash algorithm is used for the HMAC.
498*1c60b9acSAndroid Build Coastguard Worker 	 *       The HMAC-SHA-256 output is truncated to T_LEN=16 octets, by
499*1c60b9acSAndroid Build Coastguard Worker 	 *       stripping off the final 16 octets.
500*1c60b9acSAndroid Build Coastguard Worker 	 */
501*1c60b9acSAndroid Build Coastguard Worker 	{	/* required */
502*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
503*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_SHA256,
504*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
505*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_CBC,
506*1c60b9acSAndroid Build Coastguard Worker 		"A128CBC-HS256", NULL, 256, 256, 128
507*1c60b9acSAndroid Build Coastguard Worker 	},
508*1c60b9acSAndroid Build Coastguard Worker 	/*
509*1c60b9acSAndroid Build Coastguard Worker 	 * AES_192_CBC_HMAC_SHA_384 is based on AES_128_CBC_HMAC_SHA_256, but
510*1c60b9acSAndroid Build Coastguard Worker 	 * with the following differences:
511*1c60b9acSAndroid Build Coastguard Worker 	 *
512*1c60b9acSAndroid Build Coastguard Worker 	 * The input key K is 48 octets long instead of 32.
513*1c60b9acSAndroid Build Coastguard Worker 	 * ENC_KEY_LEN is 24 octets instead of 16.
514*1c60b9acSAndroid Build Coastguard Worker 	 * MAC_KEY_LEN is 24 octets instead of 16.
515*1c60b9acSAndroid Build Coastguard Worker 	 * SHA-384 is used for the HMAC instead of SHA-256.
516*1c60b9acSAndroid Build Coastguard Worker 	 * The HMAC SHA-384 value is truncated to T_LEN=24 octets instead of 16.
517*1c60b9acSAndroid Build Coastguard Worker 	 */
518*1c60b9acSAndroid Build Coastguard Worker 	{	/* required */
519*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
520*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_SHA384,
521*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
522*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_CBC,
523*1c60b9acSAndroid Build Coastguard Worker 		"A192CBC-HS384", NULL, 384, 384, 192
524*1c60b9acSAndroid Build Coastguard Worker 	},
525*1c60b9acSAndroid Build Coastguard Worker 	/*
526*1c60b9acSAndroid Build Coastguard Worker 	 * AES_256_CBC_HMAC_SHA_512 is based on AES_128_CBC_HMAC_SHA_256, but
527*1c60b9acSAndroid Build Coastguard Worker 	 * with the following differences:
528*1c60b9acSAndroid Build Coastguard Worker 	 *
529*1c60b9acSAndroid Build Coastguard Worker 	 * The input key K is 64 octets long instead of 32.
530*1c60b9acSAndroid Build Coastguard Worker 	 * ENC_KEY_LEN is 32 octets instead of 16.
531*1c60b9acSAndroid Build Coastguard Worker 	 * MAC_KEY_LEN is 32 octets instead of 16.
532*1c60b9acSAndroid Build Coastguard Worker 	 * SHA-512 is used for the HMAC instead of SHA-256.
533*1c60b9acSAndroid Build Coastguard Worker 	 * The HMAC SHA-512 value is truncated to T_LEN=32 octets instead of 16.
534*1c60b9acSAndroid Build Coastguard Worker 	 */
535*1c60b9acSAndroid Build Coastguard Worker 	{	/* required */
536*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
537*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_SHA512,
538*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
539*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_CBC,
540*1c60b9acSAndroid Build Coastguard Worker 		"A256CBC-HS512", NULL, 512, 512, 256
541*1c60b9acSAndroid Build Coastguard Worker 	},
542*1c60b9acSAndroid Build Coastguard Worker 
543*1c60b9acSAndroid Build Coastguard Worker 	/*
544*1c60b9acSAndroid Build Coastguard Worker 	 * The CEK is used as the encryption key.
545*1c60b9acSAndroid Build Coastguard Worker 	 *
546*1c60b9acSAndroid Build Coastguard Worker 	 * Use of an IV of size 96 bits is REQUIRED with this algorithm.
547*1c60b9acSAndroid Build Coastguard Worker 	 *
548*1c60b9acSAndroid Build Coastguard Worker 	 * The requested size of the Authentication Tag output MUST be 128 bits,
549*1c60b9acSAndroid Build Coastguard Worker 	 * regardless of the key size.
550*1c60b9acSAndroid Build Coastguard Worker 	 */
551*1c60b9acSAndroid Build Coastguard Worker 	{	/* recommended: AES GCM using 128-bit key  */
552*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
553*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
554*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
555*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_GCM,
556*1c60b9acSAndroid Build Coastguard Worker 		"A128GCM", NULL, 128, 128, 96
557*1c60b9acSAndroid Build Coastguard Worker 	},
558*1c60b9acSAndroid Build Coastguard Worker 	{	/* optional: AES GCM using 192-bit key  */
559*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
560*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
561*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
562*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_GCM,
563*1c60b9acSAndroid Build Coastguard Worker 		"A192GCM", NULL, 192, 192, 96
564*1c60b9acSAndroid Build Coastguard Worker 	},
565*1c60b9acSAndroid Build Coastguard Worker 	{	/* recommended: AES GCM using 256-bit key */
566*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHASH_TYPE_UNKNOWN,
567*1c60b9acSAndroid Build Coastguard Worker 		LWS_GENHMAC_TYPE_UNKNOWN,
568*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_NONE,
569*1c60b9acSAndroid Build Coastguard Worker 		LWS_JOSE_ENCTYPE_AES_GCM,
570*1c60b9acSAndroid Build Coastguard Worker 		"A256GCM", NULL, 256, 256, 96
571*1c60b9acSAndroid Build Coastguard Worker 	},
572*1c60b9acSAndroid Build Coastguard Worker 	{ 0, 0, 0, 0, NULL, NULL, 0, 0, 0 } /* sentinel */
573*1c60b9acSAndroid Build Coastguard Worker };
574*1c60b9acSAndroid Build Coastguard Worker 
575*1c60b9acSAndroid Build Coastguard Worker int
lws_gencrypto_jws_alg_to_definition(const char * alg,const struct lws_jose_jwe_alg ** jose)576*1c60b9acSAndroid Build Coastguard Worker lws_gencrypto_jws_alg_to_definition(const char *alg,
577*1c60b9acSAndroid Build Coastguard Worker 				    const struct lws_jose_jwe_alg **jose)
578*1c60b9acSAndroid Build Coastguard Worker {
579*1c60b9acSAndroid Build Coastguard Worker 	const struct lws_jose_jwe_alg *a = lws_gencrypto_jws_alg_map;
580*1c60b9acSAndroid Build Coastguard Worker 
581*1c60b9acSAndroid Build Coastguard Worker 	while (a->alg) {
582*1c60b9acSAndroid Build Coastguard Worker 		if (!strcmp(alg, a->alg)) {
583*1c60b9acSAndroid Build Coastguard Worker 			*jose = a;
584*1c60b9acSAndroid Build Coastguard Worker 
585*1c60b9acSAndroid Build Coastguard Worker 			return 0;
586*1c60b9acSAndroid Build Coastguard Worker 		}
587*1c60b9acSAndroid Build Coastguard Worker 		a++;
588*1c60b9acSAndroid Build Coastguard Worker 	}
589*1c60b9acSAndroid Build Coastguard Worker 
590*1c60b9acSAndroid Build Coastguard Worker 	return 1;
591*1c60b9acSAndroid Build Coastguard Worker }
592*1c60b9acSAndroid Build Coastguard Worker 
593*1c60b9acSAndroid Build Coastguard Worker int
lws_gencrypto_jwe_alg_to_definition(const char * alg,const struct lws_jose_jwe_alg ** jose)594*1c60b9acSAndroid Build Coastguard Worker lws_gencrypto_jwe_alg_to_definition(const char *alg,
595*1c60b9acSAndroid Build Coastguard Worker 				    const struct lws_jose_jwe_alg **jose)
596*1c60b9acSAndroid Build Coastguard Worker {
597*1c60b9acSAndroid Build Coastguard Worker 	const struct lws_jose_jwe_alg *a = lws_gencrypto_jwe_alg_map;
598*1c60b9acSAndroid Build Coastguard Worker 
599*1c60b9acSAndroid Build Coastguard Worker 	while (a->alg) {
600*1c60b9acSAndroid Build Coastguard Worker 		if (!strcmp(alg, a->alg)) {
601*1c60b9acSAndroid Build Coastguard Worker 			*jose = a;
602*1c60b9acSAndroid Build Coastguard Worker 
603*1c60b9acSAndroid Build Coastguard Worker 			return 0;
604*1c60b9acSAndroid Build Coastguard Worker 		}
605*1c60b9acSAndroid Build Coastguard Worker 		a++;
606*1c60b9acSAndroid Build Coastguard Worker 	}
607*1c60b9acSAndroid Build Coastguard Worker 
608*1c60b9acSAndroid Build Coastguard Worker 	return 1;
609*1c60b9acSAndroid Build Coastguard Worker }
610*1c60b9acSAndroid Build Coastguard Worker 
611*1c60b9acSAndroid Build Coastguard Worker int
lws_gencrypto_jwe_enc_to_definition(const char * enc,const struct lws_jose_jwe_alg ** jose)612*1c60b9acSAndroid Build Coastguard Worker lws_gencrypto_jwe_enc_to_definition(const char *enc,
613*1c60b9acSAndroid Build Coastguard Worker 				    const struct lws_jose_jwe_alg **jose)
614*1c60b9acSAndroid Build Coastguard Worker {
615*1c60b9acSAndroid Build Coastguard Worker 	const struct lws_jose_jwe_alg *e = lws_gencrypto_jwe_enc_map;
616*1c60b9acSAndroid Build Coastguard Worker 
617*1c60b9acSAndroid Build Coastguard Worker 	while (e->alg) {
618*1c60b9acSAndroid Build Coastguard Worker 		if (!strcmp(enc, e->alg)) {
619*1c60b9acSAndroid Build Coastguard Worker 			*jose = e;
620*1c60b9acSAndroid Build Coastguard Worker 
621*1c60b9acSAndroid Build Coastguard Worker 			return 0;
622*1c60b9acSAndroid Build Coastguard Worker 		}
623*1c60b9acSAndroid Build Coastguard Worker 		e++;
624*1c60b9acSAndroid Build Coastguard Worker 	}
625*1c60b9acSAndroid Build Coastguard Worker 
626*1c60b9acSAndroid Build Coastguard Worker 	return 1;
627*1c60b9acSAndroid Build Coastguard Worker }
628*1c60b9acSAndroid Build Coastguard Worker 
629*1c60b9acSAndroid Build Coastguard Worker size_t
lws_genhash_size(enum lws_genhash_types type)630*1c60b9acSAndroid Build Coastguard Worker lws_genhash_size(enum lws_genhash_types type)
631*1c60b9acSAndroid Build Coastguard Worker {
632*1c60b9acSAndroid Build Coastguard Worker 	switch(type) {
633*1c60b9acSAndroid Build Coastguard Worker 	case LWS_GENHASH_TYPE_UNKNOWN:
634*1c60b9acSAndroid Build Coastguard Worker 		return 0;
635*1c60b9acSAndroid Build Coastguard Worker 	case LWS_GENHASH_TYPE_MD5:
636*1c60b9acSAndroid Build Coastguard Worker 		return 16;
637*1c60b9acSAndroid Build Coastguard Worker 	case LWS_GENHASH_TYPE_SHA1:
638*1c60b9acSAndroid Build Coastguard Worker 		return 20;
639*1c60b9acSAndroid Build Coastguard Worker 	case LWS_GENHASH_TYPE_SHA256:
640*1c60b9acSAndroid Build Coastguard Worker 		return 32;
641*1c60b9acSAndroid Build Coastguard Worker 	case LWS_GENHASH_TYPE_SHA384:
642*1c60b9acSAndroid Build Coastguard Worker 		return 48;
643*1c60b9acSAndroid Build Coastguard Worker 	case LWS_GENHASH_TYPE_SHA512:
644*1c60b9acSAndroid Build Coastguard Worker 		return 64;
645*1c60b9acSAndroid Build Coastguard Worker 	}
646*1c60b9acSAndroid Build Coastguard Worker 
647*1c60b9acSAndroid Build Coastguard Worker 	return 0;
648*1c60b9acSAndroid Build Coastguard Worker }
649*1c60b9acSAndroid Build Coastguard Worker 
650*1c60b9acSAndroid Build Coastguard Worker size_t
lws_genhmac_size(enum lws_genhmac_types type)651*1c60b9acSAndroid Build Coastguard Worker lws_genhmac_size(enum lws_genhmac_types type)
652*1c60b9acSAndroid Build Coastguard Worker {
653*1c60b9acSAndroid Build Coastguard Worker 	switch(type) {
654*1c60b9acSAndroid Build Coastguard Worker 	case LWS_GENHMAC_TYPE_UNKNOWN:
655*1c60b9acSAndroid Build Coastguard Worker 		return 0;
656*1c60b9acSAndroid Build Coastguard Worker 	case LWS_GENHMAC_TYPE_SHA256:
657*1c60b9acSAndroid Build Coastguard Worker 		return 32;
658*1c60b9acSAndroid Build Coastguard Worker 	case LWS_GENHMAC_TYPE_SHA384:
659*1c60b9acSAndroid Build Coastguard Worker 		return 48;
660*1c60b9acSAndroid Build Coastguard Worker 	case LWS_GENHMAC_TYPE_SHA512:
661*1c60b9acSAndroid Build Coastguard Worker 		return 64;
662*1c60b9acSAndroid Build Coastguard Worker 	}
663*1c60b9acSAndroid Build Coastguard Worker 
664*1c60b9acSAndroid Build Coastguard Worker 	return 0;
665*1c60b9acSAndroid Build Coastguard Worker }
666*1c60b9acSAndroid Build Coastguard Worker 
667*1c60b9acSAndroid Build Coastguard Worker int
lws_gencrypto_bits_to_bytes(int bits)668*1c60b9acSAndroid Build Coastguard Worker lws_gencrypto_bits_to_bytes(int bits)
669*1c60b9acSAndroid Build Coastguard Worker {
670*1c60b9acSAndroid Build Coastguard Worker 	if (bits & 7)
671*1c60b9acSAndroid Build Coastguard Worker 		return (bits / 8) + 1;
672*1c60b9acSAndroid Build Coastguard Worker 
673*1c60b9acSAndroid Build Coastguard Worker 	return bits / 8;
674*1c60b9acSAndroid Build Coastguard Worker }
675*1c60b9acSAndroid Build Coastguard Worker 
676*1c60b9acSAndroid Build Coastguard Worker int
lws_base64_size(int bytes)677*1c60b9acSAndroid Build Coastguard Worker lws_base64_size(int bytes)
678*1c60b9acSAndroid Build Coastguard Worker {
679*1c60b9acSAndroid Build Coastguard Worker 	return ((bytes * 4) / 3) + 6;
680*1c60b9acSAndroid Build Coastguard Worker }
681*1c60b9acSAndroid Build Coastguard Worker 
682*1c60b9acSAndroid Build Coastguard Worker void
lws_gencrypto_destroy_elements(struct lws_gencrypto_keyelem * el,int m)683*1c60b9acSAndroid Build Coastguard Worker lws_gencrypto_destroy_elements(struct lws_gencrypto_keyelem *el, int m)
684*1c60b9acSAndroid Build Coastguard Worker {
685*1c60b9acSAndroid Build Coastguard Worker 	int n;
686*1c60b9acSAndroid Build Coastguard Worker 
687*1c60b9acSAndroid Build Coastguard Worker 	for (n = 0; n < m; n++)
688*1c60b9acSAndroid Build Coastguard Worker 		if (el[n].buf)
689*1c60b9acSAndroid Build Coastguard Worker 			lws_free_set_NULL(el[n].buf);
690*1c60b9acSAndroid Build Coastguard Worker }
691*1c60b9acSAndroid Build Coastguard Worker 
lws_gencrypto_padded_length(size_t pad_block_size,size_t len)692*1c60b9acSAndroid Build Coastguard Worker size_t lws_gencrypto_padded_length(size_t pad_block_size, size_t len)
693*1c60b9acSAndroid Build Coastguard Worker {
694*1c60b9acSAndroid Build Coastguard Worker 	return (len / pad_block_size + 1) * pad_block_size;
695*1c60b9acSAndroid Build Coastguard Worker }
696