requests.go 9.82 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11
package irmago

import (
	"crypto/sha256"
	"encoding/asn1"
	"fmt"
	"log"
	"math/big"
	"strconv"
	"time"

Sietse Ringers's avatar
Sietse Ringers committed
12
	"github.com/go-errors/errors"
Sietse Ringers's avatar
Sietse Ringers committed
13 14
	"github.com/mhe/gabi"
)
15

Sietse Ringers's avatar
Sietse Ringers committed
16
// SessionRequest contains the context and nonce for an IRMA session.
17
type SessionRequest struct {
Sietse Ringers's avatar
Sietse Ringers committed
18 19
	Context *big.Int `json:"context"`
	Nonce   *big.Int `json:"nonce"`
20
	choice  *DisclosureChoice
Sietse Ringers's avatar
Sietse Ringers committed
21 22
}

23
// DisclosureChoice returns the attributes to be disclosed in this session.
Sietse Ringers's avatar
Sietse Ringers committed
24 25 26 27
func (sr *SessionRequest) DisclosureChoice() *DisclosureChoice {
	return sr.choice
}

28
// SetDisclosureChoice sets the attributes to be disclosed in this session.
Sietse Ringers's avatar
Sietse Ringers committed
29 30
func (sr *SessionRequest) SetDisclosureChoice(choice *DisclosureChoice) {
	sr.choice = choice
31 32
}

Sietse Ringers's avatar
Sietse Ringers committed
33
// A DisclosureRequest is a request to disclose certain attributes.
34 35 36 37 38
type DisclosureRequest struct {
	SessionRequest
	Content AttributeDisjunctionList `json:"content"`
}

Sietse Ringers's avatar
Sietse Ringers committed
39
// A SignatureRequest is a a request to sign a message with certain attributes.
40 41 42 43 44 45
type SignatureRequest struct {
	DisclosureRequest
	Message     string `json:"message"`
	MessageType string `json:"messageType"`
}

Sietse Ringers's avatar
Sietse Ringers committed
46 47
// An IssuanceRequest is a request to issue certain credentials,
// optionally also asking for certain attributes to be simultaneously disclosed.
48 49
type IssuanceRequest struct {
	SessionRequest
50 51 52
	Credentials        []*CredentialRequest     `json:"credentials"`
	Disclose           AttributeDisjunctionList `json:"disclose"`
	CredentialInfoList CredentialInfoList       `json:",omitempty"`
Sietse Ringers's avatar
Sietse Ringers committed
53 54

	state *issuanceState
55 56
}

Sietse Ringers's avatar
Sietse Ringers committed
57 58
// A CredentialRequest contains the attributes and metadata of a credential
// that will be issued in an IssuanceRequest.
59
type CredentialRequest struct {
60 61 62 63
	Validity         *Timestamp                `json:"validity"`
	KeyCounter       int                       `json:"keyCounter"`
	CredentialTypeID *CredentialTypeIdentifier `json:"credential"`
	Attributes       map[string]string         `json:"attributes"`
Sietse Ringers's avatar
Sietse Ringers committed
64 65
}

Sietse Ringers's avatar
Sietse Ringers committed
66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105
// ServerJwt contains standard JWT fields.
type ServerJwt struct {
	Type       string    `json:"sub"`
	ServerName string    `json:"iss"`
	IssuedAt   Timestamp `json:"iat"`
}

// A ServiceProviderRequest contains a disclosure request.
type ServiceProviderRequest struct {
	Request *DisclosureRequest `json:"request"`
}

// A SignatureRequestorRequest contains a signing request.
type SignatureRequestorRequest struct {
	Request *SignatureRequest `json:"request"`
}

// An IdentityProviderRequest contains an issuance request.
type IdentityProviderRequest struct {
	Request *IssuanceRequest `json:"request"`
}

// ServiceProviderJwt is a requestor JWT for a disclosure session.
type ServiceProviderJwt struct {
	ServerJwt
	Request ServiceProviderRequest `json:"sprequest"`
}

// SignatureRequestorJwt is a requestor JWT for a signing session.
type SignatureRequestorJwt struct {
	ServerJwt
	Request SignatureRequestorRequest `json:"absrequest"`
}

// IdentityProviderJwt is a requestor JWT for issuance session.
type IdentityProviderJwt struct {
	ServerJwt
	Request IdentityProviderRequest `json:"iprequest"`
}

Sietse Ringers's avatar
Sietse Ringers committed
106 107 108 109 110 111 112 113
// Timestamp is a time.Time that marshals to Unix timestamps.
type Timestamp time.Time

type issuanceState struct {
	nonce2   *big.Int
	builders []*gabi.CredentialBuilder
}

114 115 116 117 118 119 120 121
func (cr *CredentialRequest) Info(store *ConfigurationStore) (*CredentialInfo, error) {
	list, err := cr.AttributeList(store)
	if err != nil {
		return nil, err
	}
	return NewCredentialInfo(list.Ints, store), nil
}

Sietse Ringers's avatar
Sietse Ringers committed
122
// AttributeList returns the list of attributes from this credential request.
123
func (cr *CredentialRequest) AttributeList(store *ConfigurationStore) (*AttributeList, error) {
Sietse Ringers's avatar
Sietse Ringers committed
124 125
	meta := NewMetadataAttribute()
	meta.setKeyCounter(cr.KeyCounter)
126
	meta.setCredentialTypeIdentifier(cr.CredentialTypeID.String())
Sietse Ringers's avatar
Sietse Ringers committed
127 128 129 130 131 132 133
	meta.setSigningDate()
	err := meta.setExpiryDate(cr.Validity)
	if err != nil {
		return nil, err
	}

	attrs := make([]*big.Int, len(cr.Attributes)+1, len(cr.Attributes)+1)
134
	credtype := store.CredentialTypes[*cr.CredentialTypeID]
Sietse Ringers's avatar
Sietse Ringers committed
135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150
	if credtype == nil {
		return nil, errors.New("Unknown credential type")
	}
	if len(credtype.Attributes) != len(cr.Attributes) {
		return nil, errors.New("Received unexpected amount of attributes")
	}

	attrs[0] = meta.Int
	for i, attrtype := range credtype.Attributes {
		if str, present := cr.Attributes[attrtype.ID]; present {
			attrs[i+1] = new(big.Int).SetBytes([]byte(str))
		} else {
			return nil, errors.New("Unknown attribute")
		}
	}

151
	return NewAttributeListFromInts(attrs, store), nil
Sietse Ringers's avatar
Sietse Ringers committed
152 153
}

Sietse Ringers's avatar
Cleanup  
Sietse Ringers committed
154
func newIssuanceState() (*issuanceState, error) {
Sietse Ringers's avatar
Sietse Ringers committed
155 156 157 158 159 160 161 162
	nonce2, err := gabi.RandomBigInt(gabi.DefaultSystemParameters[4096].Lstatzk)
	if err != nil {
		return nil, err
	}
	return &issuanceState{
		nonce2:   nonce2,
		builders: []*gabi.CredentialBuilder{},
	}, nil
163 164
}

165
// Distributed indicates if a keyshare is involved in this session.
166
func (ir *IssuanceRequest) Distributed(store *ConfigurationStore) bool {
Sietse Ringers's avatar
Sietse Ringers committed
167
	for _, manager := range ir.SchemeManagers() {
168
		if store.SchemeManagers[manager].Distributed() {
Sietse Ringers's avatar
Sietse Ringers committed
169 170 171 172 173 174
			return true
		}
	}
	return false
}

175
// SchemeManagers returns a list of all scheme managers involved in this session.
Sietse Ringers's avatar
Sietse Ringers committed
176 177 178
func (ir *IssuanceRequest) SchemeManagers() []SchemeManagerIdentifier {
	list := []SchemeManagerIdentifier{}
	for _, cred := range ir.Credentials {
179
		list = append(list, cred.CredentialTypeID.IssuerIdentifier().SchemeManagerIdentifier())
Sietse Ringers's avatar
Sietse Ringers committed
180 181 182 183 184 185 186 187 188
	}
	for _, disjunctions := range ir.Disclose {
		for _, attr := range disjunctions.Attributes {
			list = append(list, attr.CredentialTypeIdentifier().IssuerIdentifier().SchemeManagerIdentifier())
		}
	}
	return list
}

Sietse Ringers's avatar
Sietse Ringers committed
189 190
// ToDisclose returns the attributes that must be disclosed in this issuance session.
func (ir *IssuanceRequest) ToDisclose() AttributeDisjunctionList { return ir.Disclose }
Sietse Ringers's avatar
Sietse Ringers committed
191 192 193 194 195 196 197 198 199 200 201 202 203

// GetContext returns the context of this session.
func (ir *IssuanceRequest) GetContext() *big.Int { return ir.Context }

// SetContext sets the context of this session.
func (ir *IssuanceRequest) SetContext(context *big.Int) { ir.Context = context }

// GetNonce returns the nonce of this session.
func (ir *IssuanceRequest) GetNonce() *big.Int { return ir.Nonce }

// SetNonce sets the nonce of this session.
func (ir *IssuanceRequest) SetNonce(nonce *big.Int) { ir.Nonce = nonce }

204
// Distributed indicates if a keyshare is involved in this session.
205
func (dr *DisclosureRequest) Distributed(store *ConfigurationStore) bool {
Sietse Ringers's avatar
Sietse Ringers committed
206
	for _, manager := range dr.SchemeManagers() {
207
		if store.SchemeManagers[manager].Distributed() {
Sietse Ringers's avatar
Sietse Ringers committed
208 209 210 211 212 213
			return true
		}
	}
	return false
}

214
// SchemeManagers returns a list of all scheme managers involved in this session.
Sietse Ringers's avatar
Sietse Ringers committed
215 216 217 218 219 220 221 222 223 224
func (dr *DisclosureRequest) SchemeManagers() []SchemeManagerIdentifier {
	list := []SchemeManagerIdentifier{}
	for _, disjunction := range dr.Content {
		for _, attr := range disjunction.Attributes {
			list = append(list, attr.CredentialTypeIdentifier().IssuerIdentifier().SchemeManagerIdentifier())
		}
	}
	return list
}

Sietse Ringers's avatar
Sietse Ringers committed
225 226
// ToDisclose returns the attributes to be disclosed in this session.
func (dr *DisclosureRequest) ToDisclose() AttributeDisjunctionList { return dr.Content }
Sietse Ringers's avatar
Sietse Ringers committed
227 228 229 230 231 232 233 234 235 236 237 238 239 240 241

// GetContext returns the context of this session.
func (dr *DisclosureRequest) GetContext() *big.Int { return dr.Context }

// SetContext sets the context of this session.
func (dr *DisclosureRequest) SetContext(context *big.Int) { dr.Context = context }

// GetNonce returns the nonce of this session.
func (dr *DisclosureRequest) GetNonce() *big.Int { return dr.Nonce }

// SetNonce sets the nonce of this session.
func (dr *DisclosureRequest) SetNonce(nonce *big.Int) { dr.Nonce = nonce }

// GetNonce returns the nonce of this signature session
// (with the message already hashed into it).
242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269
func (sr *SignatureRequest) GetNonce() *big.Int {
	hashbytes := sha256.Sum256([]byte(sr.Message))
	hashint := new(big.Int).SetBytes(hashbytes[:])
	// TODO the 2 should be abstracted away
	asn1bytes, err := asn1.Marshal([]interface{}{big.NewInt(2), sr.Nonce, hashint})
	if err != nil {
		log.Print(err) // TODO? does this happen?
	}
	asn1hash := sha256.Sum256(asn1bytes)
	return new(big.Int).SetBytes(asn1hash[:])
}

// MarshalJSON marshals a timestamp.
func (t *Timestamp) MarshalJSON() ([]byte, error) {
	ts := time.Time(*t).Unix()
	stamp := fmt.Sprint(ts)
	return []byte(stamp), nil
}

// UnmarshalJSON unmarshals a timestamp.
func (t *Timestamp) UnmarshalJSON(b []byte) error {
	ts, err := strconv.Atoi(string(b))
	if err != nil {
		return err
	}
	*t = Timestamp(time.Unix(int64(ts), 0))
	return nil
}
Sietse Ringers's avatar
Sietse Ringers committed
270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308

// NewServiceProviderJwt returns a new ServiceProviderJwt.
func NewServiceProviderJwt(servername string, dr *DisclosureRequest) *ServiceProviderJwt {
	return &ServiceProviderJwt{
		ServerJwt: ServerJwt{
			ServerName: servername,
			IssuedAt:   Timestamp(time.Now()),
			Type:       "verification_request",
		},
		Request: ServiceProviderRequest{Request: dr},
	}
}

// NewSignatureRequestorJwt returns a new SignatureRequestorJwt.
func NewSignatureRequestorJwt(servername string, sr *SignatureRequest) *SignatureRequestorJwt {
	return &SignatureRequestorJwt{
		ServerJwt: ServerJwt{
			ServerName: servername,
			IssuedAt:   Timestamp(time.Now()),
			Type:       "signature_request",
		},
		Request: SignatureRequestorRequest{Request: sr},
	}
}

// NewIdentityProviderJwt returns a new IdentityProviderJwt.
func NewIdentityProviderJwt(servername string, ir *IssuanceRequest) *IdentityProviderJwt {
	return &IdentityProviderJwt{
		ServerJwt: ServerJwt{
			ServerName: servername,
			IssuedAt:   Timestamp(time.Now()),
			Type:       "issue_request",
		},
		Request: IdentityProviderRequest{Request: ir},
	}
}

// A RequestorJwt contains an IRMA session object.
type RequestorJwt interface {
309
	IrmaSession() IrmaSession
Sietse Ringers's avatar
Sietse Ringers committed
310 311 312
}

// IrmaSession returns an IRMA session object.
313
func (jwt *ServiceProviderJwt) IrmaSession() IrmaSession { return jwt.Request.Request }
Sietse Ringers's avatar
Sietse Ringers committed
314 315

// IrmaSession returns an IRMA session object.
316
func (jwt *SignatureRequestorJwt) IrmaSession() IrmaSession { return jwt.Request.Request }
Sietse Ringers's avatar
Sietse Ringers committed
317 318

// IrmaSession returns an IRMA session object.
319
func (jwt *IdentityProviderJwt) IrmaSession() IrmaSession { return jwt.Request.Request }