cryptutil: add SecureToken (#2681)

* cryptutil: add SecureToken

* add parse
This commit is contained in:
Caleb Doxsey 2021-10-14 18:48:41 -06:00 committed by GitHub
parent 4e4a161521
commit 0f0a5dc7f0
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 147 additions and 0 deletions

View file

@ -1,6 +1,12 @@
package cryptutil
import (
"crypto/hmac"
"crypto/sha256"
"encoding/binary"
"errors"
"time"
"github.com/btcsuite/btcutil/base58"
"github.com/google/uuid"
)
@ -66,3 +72,96 @@ func (tok SecretToken) String() string {
copy(bs[TokenLength:], tok.Secret[:])
return base58.Encode(bs)
}
// errors related to the SecureToken
var (
ErrExpired = errors.New("expired")
ErrInvalid = errors.New("invalid")
)
const (
// SecureTokenTimeLength is the length of the time part of the SecureToken.
SecureTokenTimeLength = 8
// SecureTokenHMACLength is the length of the HMAC part of the SecureToken.
SecureTokenHMACLength = 32
// SecureTokenLength is the byte length of a SecureToken.
SecureTokenLength = TokenLength + SecureTokenTimeLength + SecureTokenHMACLength
)
// A SecureToken is an HMAC'd Token with an expiration time.
type SecureToken [SecureTokenLength]byte
// GenerateSecureToken generates a SecureToken from the given key, expiry and token.
func GenerateSecureToken(key []byte, expiry time.Time, token Token) SecureToken {
var secureToken SecureToken
copy(secureToken[:], token[:])
binary.BigEndian.PutUint64(secureToken[TokenLength:], uint64(expiry.UnixMilli()))
h := secureToken.computeHMAC(key)
copy(secureToken[TokenLength+SecureTokenTimeLength:], h[:])
return secureToken
}
// SecureTokenFromString parses a base58-encoded string into a SecureToken.
func SecureTokenFromString(rawstr string) (secureToken SecureToken, ok bool) {
result := base58.Decode(rawstr)
if len(result) != SecureTokenLength {
return secureToken, false
}
copy(secureToken[:], result[:SecureTokenLength])
return secureToken, true
}
// Bytes returns the secret token as bytes.
func (secureToken SecureToken) Bytes() []byte {
return secureToken[:]
}
// Expiry returns the SecureToken expiration time.
func (secureToken SecureToken) Expiry() time.Time {
return time.UnixMilli(int64(binary.BigEndian.Uint64(secureToken[TokenLength:])))
}
// HMAC returns the HMAC part of the SecureToken.
func (secureToken SecureToken) HMAC() [SecureTokenHMACLength]byte {
var result [SecureTokenHMACLength]byte
copy(result[:], secureToken[TokenLength+SecureTokenTimeLength:])
return result
}
// String returns the SecureToken as a string.
func (secureToken SecureToken) String() string {
return base58.Encode(secureToken[:])
}
// Token returns the Token part of the SecureToken.
func (secureToken SecureToken) Token() Token {
var result Token
copy(result[:], secureToken[:])
return result
}
// Verify verifies that the SecureToken has a valid HMAC and hasn't expired.
func (secureToken SecureToken) Verify(key []byte, now time.Time) error {
if !secureToken.checkHMAC(key) {
return ErrInvalid
}
if secureToken.Expiry().Before(now) {
return ErrExpired
}
return nil
}
func (secureToken SecureToken) checkHMAC(key []byte) bool {
expectedHMAC := secureToken.computeHMAC(key)
actualHMAC := secureToken.HMAC()
return hmac.Equal(actualHMAC[:], expectedHMAC[:])
}
func (secureToken SecureToken) computeHMAC(key []byte) (result [SecureTokenHMACLength]byte) {
h := hmac.New(sha256.New, key)
h.Write(secureToken[:TokenLength+SecureTokenTimeLength])
copy(result[:], h.Sum(nil))
return result
}