- Notifications
You must be signed in to change notification settings - Fork8
License
senzacionale/xamarin-jose-jwt
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Xamarin Ultimate Javascript Object Signing and Encryption (JOSE) and JSON Web Token (JWT) Implementation for .NET 4.0+
This is copy ofhttps://github.com/dvsekhvalnov/jose-jwt build for Xamarin Assemblies (http://developer.xamarin.com/guides/android/under_the_hood/assemblies/)
Minimallistic library for generating, decoding and encryptionJSON Web Tokens. Supports full suiteofJSON Web Algorithms as of July 4, 2014 version. JSON parsing agnostic, can plug any desired JSON processing library.Extensively tested for compatibility withjose.4.j,Nimbus-JOSE-JWT andjson-jwt libraries.
- WinRT compatible version (Windows 8.1 and Windows Phone 8.1) is avaliable here:JoseRT.
Newtonsoft.Json
The easiest way to install is via NuGet. Seehere. Else, you can download and compile it yourself.
Originally forked fromhttps://github.com/johnsheehan/jwt . Almost re-written from scratch to support JWT encryption capabilities and unified interface for encoding/decoding/encryptionand other features.Moved to separate project in February 2014.
AES Key Wrap implementation ideas and test data fromhttp://www.cryptofreak.org/projects/rfc3394/ by Jay Miller
Signing
- HMAC signatures with HS256, HS384 and HS512.
- ECDSA signatures with ES256, ES384 and ES512.
- RSASSA-PKCS1-V1_5 signatures with RS256, RS384 and RS512.
- RSASSA-PSS signatures (probabilistic signature scheme with appendix) with PS256, PS384 and PS512.
- NONE (unprotected) plain text algorithm without integrity protection
Encryption
- RSAES OAEP 256 (using SHA-256 and MGF1 with SHA-256) encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
- RSAES OAEP (using SHA-1 and MGF1 with SHA-1) encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
- RSAES-PKCS1-V1_5 encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
- Direct symmetric key encryption with pre-shared key A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM and A256GCM
- A128KW, A192KW, A256KW encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
- A128GCMKW, A192GCMKW, A256GCMKW encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
- ECDH-ES* with A128CBC-HS256, A128GCM, A192GCM, A256GCM
- ECDH-ES+A128KW*, ECDH-ES+A192KW*, ECDH-ES+A256KW* with A128CBC-HS256, A128GCM, A192GCM, A256GCM
- PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
Compression
- DEFLATE compression
* It appears that Microsoft CNG implementation of BCryptSecretAgreement/NCryptSecretAgreement contains a bug for calculating Elliptic Curve Diffie–Hellman secret agreementon keys higher than 256 bit (P-384 and P-521 NIST curves correspondingly). At least produced secret agreements do not match any other implementation in different languages.Technically it is possible to use ECDH-ES or ECDH-ES+AES Key Wrap family with A192CBC-HS384 and A256CBC-HS512 but most likely produced JWT tokens will not be compatible with other platforms and therefore can't be decoded correctly.
Install-Package jose-jwt
Grab source and compile yourself.
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};stringtoken=Jose.JWT.Encode(payload,null,JwsAlgorithm.none);
HS256, HS384, HS512 signatures requirebyte[]
array key of corresponding length
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};varsecretKey=newbyte[]{164,60,194,0,161,189,41,38,130,89,141,164,45,170,159,209,69,137,243,216,191,131,47,250,32,107,231,117,37,158,225,234};stringtoken=Jose.JWT.Encode(json,secretKey,JwsAlgorithm.HS256);
RS256, RS384, RS512 and PS256, PS384, PS512 signatures requireRSACryptoServiceProvider
(usually private) key of corresponding length. CSP need to be forced to use Microsoft Enhanced RSA and AES Cryptographic Provider.Which usually can be done be re-importing RSAParameters. Seehttp://clrsecurity.codeplex.com/discussions/243156 for details.
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};varprivateKey=newX509Certificate2("my-key.p12","password",X509KeyStorageFlags.Exportable|X509KeyStorageFlags.MachineKeySet).PrivateKeyasRSACryptoServiceProvider;stringtoken=Jose.JWT.Encode(payload,privateKey,JwsAlgorithm.RS256);
ES256, ES384, ES256 ECDSA signatures requiresCngKey
(usually private) elliptic curve key of corresponding length. Normally existingCngKey
loaded viaCngKey.Open(..)
method from Key Storage Provider.But if you want to use raw key material (x,y) and d, jose-jwt provides convenient helperEccKey.New(x,y,d)
.
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};byte[]x={4,114,29,223,58,3,191,170,67,128,229,33,242,178,157,150,133,25,209,139,166,69,55,26,84,48,169,165,67,232,98,9};byte[]y={131,116,8,14,22,150,18,75,24,181,159,78,90,51,71,159,214,186,250,47,207,246,142,127,54,183,72,72,253,21,88,53};byte[]d={42,148,231,48,225,196,166,201,23,190,229,199,20,39,226,70,209,148,29,70,125,14,174,66,9,198,80,251,95,107,98,206};varprivateKey=EccKey.New(x,y,d);stringtoken=Jose.JWT.Encode(payload,privateKey,JwsAlgorithm.ES256);
RSA-OAEP-256, RSA-OAEP and RSA1_5 key management requiresRSACryptoServiceProvider
(usually public) key of corresponding length.
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};varpublicKey=newX509Certificate2("my-key.p12","password").PublicKey.KeyasRSACryptoServiceProvider;stringtoken=Jose.JWT.Encode(payload,publicKey,JweAlgorithm.RSA_OAEP,JweEncryption.A256GCM);
Direct key management with pre-shared symmetric keys requiresbyte[]
array key of corresponding length
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};varsecretKey=newbyte[]{164,60,194,0,161,189,41,38,130,89,141,164,45,170,159,209,69,137,243,216,191,131,47,250,32,107,231,117,37,158,225,234};stringtoken=Jose.JWT.Encode(payload,secretKey,JweAlgorithm.DIR,JweEncryption.A128CBC_HS256);
AES128KW, AES192KW and AES256KW key management requiresbyte[]
array key of corresponding length
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};varsecretKey=newbyte[]{164,60,194,0,161,189,41,38,130,89,141,164,45,170,159,209,69,137,243,216,191,131,47,250,32,107,231,117,37,158,225,234};stringtoken=Jose.JWT.Encode(payload,secretKey,JweAlgorithm.A256KW,JweEncryption.A256CBC_HS512);
AES128GCMKW, AES192GCMKW and AES256GCMKW key management requiresbyte[]
array key of corresponding length
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};varsecretKey=newbyte[]{164,60,194,0,161,189,41,38,130,89,141,164,45,170,159,209,69,137,243,216,191,131,47,250,32,107,231,117,37,158,225,234};stringtoken=Jose.JWT.Encode(payload,secretKey,JweAlgorithm.A256GCMKW,JweEncryption.A256CBC_HS512);
ECDH-ES and ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW key management requiresCngKey
(usually public) elliptic curve key of corresponding length. Normally existingCngKey
loaded viaCngKey.Open(..)
method from Key Storage Provider.But if you want to use raw key material (x,y) and d, jose-jwt provides convenient helperEccKey.New(x,y,usage:CngKeyUsages.KeyAgreement)
.
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};byte[]x={4,114,29,223,58,3,191,170,67,128,229,33,242,178,157,150,133,25,209,139,166,69,55,26,84,48,169,165,67,232,98,9};byte[]y={131,116,8,14,22,150,18,75,24,181,159,78,90,51,71,159,214,186,250,47,207,246,142,127,54,183,72,72,253,21,88,53};varpublicKey=EccKey.New(x,y,usage:CngKeyUsages.KeyAgreement);stringtoken=Jose.JWT.Encode(payload,publicKey,JweAlgorithm.ECDH_ES,JweEncryption.A256GCM);
PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW key management requiresstring
passphrase from which key will be derived
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};stringtoken=Jose.JWT.Encode(payload,"top secret",JweAlgorithm.A256KW,JweEncryption.A256CBC_HS512);
Optional DEFLATE compression is supported
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};varpublicKey=newX509Certificate2("my-key.p12","password").PublicKey.KeyasRSACryptoServiceProvider;stringtoken=Jose.JWT.Encode(payload,publicKey,JweAlgorithm.RSA1_5,JweEncryption.A128CBC_HS256,JweCompression.DEF);
Decoding json web tokens is fully symmetric to creating signed or encrypted tokens:
HS256, HS384, HS512 signatures,A128KW, A192KW, A256KW,A128GCMKW, A192GCMKW, A256GCMKW andDIR key management algorithms expectsbyte[]
array key
stringtoken="eyJhbGciOiJkaXIiLCJlbmMiOiJBMjU2R0NNIn0..Fmz3PLVfv-ySl4IJ.LMZpXMDoBIll5yuEs81Bws2-iUUaBSpucJPL-GtDKXkPhFpJmES2T136Vd8xzvp-3JW-fvpRZtlhluqGHjywPctol71Zuz9uFQjuejIU4axA_XiAy-BadbRUm1-25FRT30WtrrxKltSkulmIS5N-Nsi_zmCz5xicB1ZnzneRXGaXY4B444_IHxGBIS_wdurPAN0OEGw4xIi2DAD1Ikc99a90L7rUZfbHNg_iTBr-OshZqDbR6C5KhmMgk5KqDJEN8Ik-Yw.Jbk8ZmO901fqECYVPKOAzg";byte[]secretKey=newbyte[]{164,60,194,0,161,189,41,38,130,89,141,164,45,170,159,209,69,137,243,216,191,131,47,250,32,107,231,117,37,158,225,234};stringjson=Jose.JWT.Decode(token,secretKey);
RS256, RS384, RS512,PS256, PS384, PS512 signatures andRSA-OAEP-256,RSA-OAEP, RSA1_5 key management algorthms expectsRSACryptoServiceProvider
as a key, public/private is asymmetric to encoding:
stringtoken="eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.bx_4TL7gh14IeM3EClP3iVfY9pbT81pflXd1lEZOVPJR6PaewRFXWmiJcaqH9fcU9IjGGQ19BS-UPtpErenL5kw7KORFgIBm4hObCYxLoAadMy8A-qQeOWyjnxbE0mbQIdoFI4nGK5qWTEQUWZCMwosvyeHLqEZDzr9CNLAAFTujvsZJJ7NLTkA0cTUzz64b57uSvMTaOK6j7Ap9ZaAgF2uaqBdZ1NzqofLeU4XYCG8pWc5Qd-Ri_1KsksjaDHk12ZU4vKIJWJ-puEnpXBLoHuko92BnN8_LXx4sfDdK7wRiXk0LU_iwoT5zb1ro7KaM0hcfidWoz95vfhPhACIsXQ.YcVAPLJ061gvPpVB-zMm4A.PveUBLejLzMjA4tViHTRXbYnxMHFu8W2ECwj9b6sF2u2azi0TbxxMhs65j-t3qm-8EKBJM7LKIlkAtQ1XBeZl4zuTeMFxsQ0VShQfwlN2r8dPFgUzb4f_MzBuFFYfP5hBs-jugm89l2ZTj8oAOOSpAlC7uTmwha3dNaDOzlJniqAl_729q5EvSjaYXMtaET9wSTNSDfMUVFcMERbB50VOhc134JDUVPTuriD0rd4tQm8Do8obFKtFeZ5l3jT73-f1tPZwZ6CmFVxUMh6gSdY5A.tR8bNx9WErquthpWZBeMaw";varprivateKey=newX509Certificate2("my-key.p12","password",X509KeyStorageFlags.Exportable|X509KeyStorageFlags.MachineKeySet).PrivateKeyasRSACryptoServiceProvider;stringjson=Jose.JWT.Decode(token,privateKey);
ES256, ES284, ES512 signatures,ECDH-ES andECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW key management algorithms expectsCngKey
as a key, public/private is asymmetric to encoding. IfEccKey.New(...)
wrapper is used, makesure correctusage:
value is set.CngKeyUsages.KeyAgreement
for ECDH-ES andCngKeyUsages.Signing
for ES-* (default value, can be ommited).
stringtoken="eyJhbGciOiJFUzI1NiIsImN0eSI6InRleHRcL3BsYWluIn0.eyJoZWxsbyI6ICJ3b3JsZCJ9.EVnmDMlz-oi05AQzts-R3aqWvaBlwVZddWkmaaHyMx5Phb2NSLgyI0kccpgjjAyo1S5KCB3LIMPfmxCX_obMKA";byte[]x={4,114,29,223,58,3,191,170,67,128,229,33,242,178,157,150,133,25,209,139,166,69,55,26,84,48,169,165,67,232,98,9};byte[]y={131,116,8,14,22,150,18,75,24,181,159,78,90,51,71,159,214,186,250,47,207,246,142,127,54,183,72,72,253,21,88,53};varpublicKey=EccKey.New(x,y);stringjson=Jose.JWT.Decode(token,publicKey);
PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW key management algorithms expectsstring
passpharase as a key
stringtoken="eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo4MTkyLCJwMnMiOiJiMFlFVmxMemtaNW9UUjBMIn0.dhPAhJ9kmaEbP-02VtEoPOF2QSEYM5085V6zYt1U1qIlVNRcHTGDgQ.4QAAq0dVQT41dQKDG7dhRA.H9MgJmesbU1ow6GCa0lEMwv8A_sHvgaWKkaMcdoj_z6O8LaMSgquxA-G85R_5hEILnHUnFllNJ48oJY7VmAJw0BQW73dMnn58u161S6Ftq7Mjxxq7bcksWvFTVtG5RsqqYSol5BZz5xm8Fcj-y5BMYMvrsCyQhYdeGEHkAvwzRdvZ8pGMsU2XPzl6GqxGjjuRh2vApAeNrj6MwKuD-k6AR0MH46EiNkVCmMkd2w8CNAXjJe9z97zky93xbxlOLozaC3NBRO2Q4bmdGdRg5y4Ew.xNqRi0ouQd7uo5UrPraedg";stringjson=Jose.JWT.Decode(token,"top secret");
jose-jwt allows to pass extra headers when encoding token to overide deafault values*.extraHeaders:
named param can be used, it acceptsIDictionary<string, object>
type.jose-jwt is NOT allow to overridealg
andenc
headers .
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};varheaders=newDictionary<string,object>(){{"typ","JWT"},{"cty","JWT"},{"keyid","111-222-333"}};varsecretKey=newbyte[]{164,60,194,0,161,189,41,38,130,89,141,164,45,170,159,209,69,137,243,216,191,131,47,250,32,107,231,117,37,158,225,234};stringtoken=Jose.JWT.Encode(payload,secretKey,JweAlgorithm.A256GCMKW,JweEncryption.A256CBC_HS512,extraHeaders:headers);
varpayload=newDictionary<string,object>(){{"sub","mr.x@contoso.com"},{"exp",1300819380}};varheaders=newDictionary<string,object>(){{"typ","JWT"},{"cty","JWT"},{"keyid","111-222-333"}};varprivateKey=newX509Certificate2("my-key.p12","password",X509KeyStorageFlags.Exportable|X509KeyStorageFlags.MachineKeySet).PrivateKeyasRSACryptoServiceProvider;stringtoken=Jose.JWT.Encode(payload,privateKey,JwsAlgorithm.RS256,extraHeaders:headers);
* For backwards compatibility signing uses pre-configuredtyp: 'JWT'
header by default.
In some cases validation (decoding) key can be unknown prior to examining token content. For instance one can use different keys per token issuer or rely on headers information to determine which key to use,do logging or other things.
jose-jwt provides helper methods to examine token content without performing actual integrity validation or decryption.
IDictionary<string, object> Jose.JWT.Headers(String token)
to return header information as dictionary andT Jose.JWT.Headers<T>(string token)
to return headers information asunmarshalled type.
string Jose.JWT.Payload(string token)
to return unparsed payload andT Jose.JWT.Payload<T>(string token)
to return unmarshalled payload type. Those 2 methods works only withsigned tokens and will throwJoseException
when applied on encrypted token.
Security warning: please note, you should NOT rely on infromation extracted by given helpers without performing token validation as second step.
Below are couple examples on how two-phase validation can be implemented with jose-jwt:
//step 1a: get headers infovarheaders=Jose.JWT.Headers(token);//step 1b: lookup validation key based on header infovarkey=FindKey(headers["keyid"]);//step 2: perform actual token validationvarpayload=Jose.JWT.Decode(token,key);
//step 1a: get payload as custom JwtToken objectvarjwt=Jose.JWT.Payload<JwtToken>(token);//step 1b: lookup validation key based on issuervarkey=FindKeyByIssuer(jwt.Iss);//step 2: perform actual token validationvarpayload=Jose.JWT.Decode<JwtToken>(token,key);
jose-jwt library is agnostic about object model used to represent json payload as well as underlying framework used to serialize/parse json objects. Library provides convinient generic methods to work directly with your object model:
MyDomainObjectobj=Jose.JWT.Decode<MyDomainObject>(token,secretKey);//will invoke configured IJsonMapper to perform parsing/mapping of content to MyDomainObjectstringdata=Jose.JWT.Encode(obj,secrectKey,JwsAlgorithm.HS256);//for object argument configured IJsonMapper will be invoked to serialize object to json string before encoding
The library provides simpleJose.IJsonMapper
interface to plug any json processing library or customize default behavior. The only requirement for mapping implementationsis ability to correctly serialize/parseIDictionary<string,object>
type.
The default suppliedJose.IJsonMapper
implementation is based onSystem.Web.Script.Serialization.JavaScriptSerializer
.
publicclassNewtonsoftMapper:IJsonMapper{publicstringSerialize(objectobj){varsettings=newJsonSerializerSettings{ContractResolver=newDictionaryKeysResolver(),NullValueHandling=NullValueHandling.Ignore,};returnJsonConvert.SerializeObject(obj,Formatting.Indented,settings);}publicTParse<T>(stringjson){varsettings=newJsonSerializerSettings{ContractResolver=newDictionaryKeysResolver(),NullValueHandling=NullValueHandling.Ignore,};returnJsonConvert.DeserializeObject<T>(json,settings);}}Jose.JWT.JsonMapper=newNewtonsoftMapper();
publicclassServiceStackMapper:IJsonMapper{publicstringSerialize(objectobj){returnServiceStack.Text.JsonSerializer.SerializeToString(obj);}publicTParse<T>(stringjson){returnServiceStack.Text.JsonSerializer.DeserializeFromString<T>(json);}}Jose.JWT.JsonMapper=newServiceStackMapper();
Checkout UnitTests\TestSuite.cs for more examples.
About
Resources
License
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Releases
Packages0
Uh oh!
There was an error while loading.Please reload this page.