requests.go 9.82 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
11
package irmago

import (
	"crypto/sha256"
	"encoding/asn1"
	"fmt"
	"log"
	"math/big"
	"strconv"
	"time"

Sietse Ringers's avatar
Sietse Ringers committed
12
	"github.com/go-errors/errors"
Sietse Ringers's avatar
Sietse Ringers committed
13
14
	"github.com/mhe/gabi"
)
15

Sietse Ringers's avatar
Sietse Ringers committed
16
// SessionRequest contains the context and nonce for an IRMA session.
17
type SessionRequest struct {
Sietse Ringers's avatar
Sietse Ringers committed
18
19
	Context *big.Int `json:"context"`
	Nonce   *big.Int `json:"nonce"`
20
	choice  *DisclosureChoice
Sietse Ringers's avatar
Sietse Ringers committed
21
22
}

23
// DisclosureChoice returns the attributes to be disclosed in this session.
Sietse Ringers's avatar
Sietse Ringers committed
24
25
26
27
func (sr *SessionRequest) DisclosureChoice() *DisclosureChoice {
	return sr.choice
}

28
// SetDisclosureChoice sets the attributes to be disclosed in this session.
Sietse Ringers's avatar
Sietse Ringers committed
29
30
func (sr *SessionRequest) SetDisclosureChoice(choice *DisclosureChoice) {
	sr.choice = choice
31
32
}

Sietse Ringers's avatar
Sietse Ringers committed
33
// A DisclosureRequest is a request to disclose certain attributes.
34
35
36
37
38
type DisclosureRequest struct {
	SessionRequest
	Content AttributeDisjunctionList `json:"content"`
}

Sietse Ringers's avatar
Sietse Ringers committed
39
// A SignatureRequest is a a request to sign a message with certain attributes.
40
41
42
43
44
45
type SignatureRequest struct {
	DisclosureRequest
	Message     string `json:"message"`
	MessageType string `json:"messageType"`
}

Sietse Ringers's avatar
Sietse Ringers committed
46
47
// An IssuanceRequest is a request to issue certain credentials,
// optionally also asking for certain attributes to be simultaneously disclosed.
48
49
type IssuanceRequest struct {
	SessionRequest
50
51
52
	Credentials        []*CredentialRequest     `json:"credentials"`
	Disclose           AttributeDisjunctionList `json:"disclose"`
	CredentialInfoList CredentialInfoList       `json:",omitempty"`
Sietse Ringers's avatar
Sietse Ringers committed
53
54

	state *issuanceState
55
56
}

Sietse Ringers's avatar
Sietse Ringers committed
57
58
// A CredentialRequest contains the attributes and metadata of a credential
// that will be issued in an IssuanceRequest.
59
type CredentialRequest struct {
60
61
62
63
	Validity         *Timestamp                `json:"validity"`
	KeyCounter       int                       `json:"keyCounter"`
	CredentialTypeID *CredentialTypeIdentifier `json:"credential"`
	Attributes       map[string]string         `json:"attributes"`
Sietse Ringers's avatar
Sietse Ringers committed
64
65
}

Sietse Ringers's avatar
Sietse Ringers committed
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
// ServerJwt contains standard JWT fields.
type ServerJwt struct {
	Type       string    `json:"sub"`
	ServerName string    `json:"iss"`
	IssuedAt   Timestamp `json:"iat"`
}

// A ServiceProviderRequest contains a disclosure request.
type ServiceProviderRequest struct {
	Request *DisclosureRequest `json:"request"`
}

// A SignatureRequestorRequest contains a signing request.
type SignatureRequestorRequest struct {
	Request *SignatureRequest `json:"request"`
}

// An IdentityProviderRequest contains an issuance request.
type IdentityProviderRequest struct {
	Request *IssuanceRequest `json:"request"`
}

// ServiceProviderJwt is a requestor JWT for a disclosure session.
type ServiceProviderJwt struct {
	ServerJwt
	Request ServiceProviderRequest `json:"sprequest"`
}

// SignatureRequestorJwt is a requestor JWT for a signing session.
type SignatureRequestorJwt struct {
	ServerJwt
	Request SignatureRequestorRequest `json:"absrequest"`
}

// IdentityProviderJwt is a requestor JWT for issuance session.
type IdentityProviderJwt struct {
	ServerJwt
	Request IdentityProviderRequest `json:"iprequest"`
}

Sietse Ringers's avatar
Sietse Ringers committed
106
107
108
109
110
111
112
113
// Timestamp is a time.Time that marshals to Unix timestamps.
type Timestamp time.Time

type issuanceState struct {
	nonce2   *big.Int
	builders []*gabi.CredentialBuilder
}

114
115
116
117
118
119
120
121
func (cr *CredentialRequest) Info(store *ConfigurationStore) (*CredentialInfo, error) {
	list, err := cr.AttributeList(store)
	if err != nil {
		return nil, err
	}
	return NewCredentialInfo(list.Ints, store), nil
}

Sietse Ringers's avatar
Sietse Ringers committed
122
// AttributeList returns the list of attributes from this credential request.
123
func (cr *CredentialRequest) AttributeList(store *ConfigurationStore) (*AttributeList, error) {
Sietse Ringers's avatar
Sietse Ringers committed
124
125
	meta := NewMetadataAttribute()
	meta.setKeyCounter(cr.KeyCounter)
126
	meta.setCredentialTypeIdentifier(cr.CredentialTypeID.String())
Sietse Ringers's avatar
Sietse Ringers committed
127
128
129
130
131
132
133
	meta.setSigningDate()
	err := meta.setExpiryDate(cr.Validity)
	if err != nil {
		return nil, err
	}

	attrs := make([]*big.Int, len(cr.Attributes)+1, len(cr.Attributes)+1)
134
	credtype := store.CredentialTypes[*cr.CredentialTypeID]
Sietse Ringers's avatar
Sietse Ringers committed
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
	if credtype == nil {
		return nil, errors.New("Unknown credential type")
	}
	if len(credtype.Attributes) != len(cr.Attributes) {
		return nil, errors.New("Received unexpected amount of attributes")
	}

	attrs[0] = meta.Int
	for i, attrtype := range credtype.Attributes {
		if str, present := cr.Attributes[attrtype.ID]; present {
			attrs[i+1] = new(big.Int).SetBytes([]byte(str))
		} else {
			return nil, errors.New("Unknown attribute")
		}
	}

151
	return NewAttributeListFromInts(attrs, store), nil
Sietse Ringers's avatar
Sietse Ringers committed
152
153
}

Sietse Ringers's avatar
Cleanup    
Sietse Ringers committed
154
func newIssuanceState() (*issuanceState, error) {
Sietse Ringers's avatar
Sietse Ringers committed
155
156
157
158
159
160
161
162
	nonce2, err := gabi.RandomBigInt(gabi.DefaultSystemParameters[4096].Lstatzk)
	if err != nil {
		return nil, err
	}
	return &issuanceState{
		nonce2:   nonce2,
		builders: []*gabi.CredentialBuilder{},
	}, nil
163
164
}

165
// Distributed indicates if a keyshare is involved in this session.
166
func (ir *IssuanceRequest) Distributed(store *ConfigurationStore) bool {
Sietse Ringers's avatar
Sietse Ringers committed
167
	for _, manager := range ir.SchemeManagers() {
168
		if store.SchemeManagers[manager].Distributed() {
Sietse Ringers's avatar
Sietse Ringers committed
169
170
171
172
173
174
			return true
		}
	}
	return false
}

175
// SchemeManagers returns a list of all scheme managers involved in this session.
Sietse Ringers's avatar
Sietse Ringers committed
176
177
178
func (ir *IssuanceRequest) SchemeManagers() []SchemeManagerIdentifier {
	list := []SchemeManagerIdentifier{}
	for _, cred := range ir.Credentials {
179
		list = append(list, cred.CredentialTypeID.IssuerIdentifier().SchemeManagerIdentifier())
Sietse Ringers's avatar
Sietse Ringers committed
180
181
182
183
184
185
186
187
188
	}
	for _, disjunctions := range ir.Disclose {
		for _, attr := range disjunctions.Attributes {
			list = append(list, attr.CredentialTypeIdentifier().IssuerIdentifier().SchemeManagerIdentifier())
		}
	}
	return list
}

Sietse Ringers's avatar
Sietse Ringers committed
189
190
// ToDisclose returns the attributes that must be disclosed in this issuance session.
func (ir *IssuanceRequest) ToDisclose() AttributeDisjunctionList { return ir.Disclose }
Sietse Ringers's avatar
Sietse Ringers committed
191
192
193
194
195
196
197
198
199
200
201
202
203

// GetContext returns the context of this session.
func (ir *IssuanceRequest) GetContext() *big.Int { return ir.Context }

// SetContext sets the context of this session.
func (ir *IssuanceRequest) SetContext(context *big.Int) { ir.Context = context }

// GetNonce returns the nonce of this session.
func (ir *IssuanceRequest) GetNonce() *big.Int { return ir.Nonce }

// SetNonce sets the nonce of this session.
func (ir *IssuanceRequest) SetNonce(nonce *big.Int) { ir.Nonce = nonce }

204
// Distributed indicates if a keyshare is involved in this session.
205
func (dr *DisclosureRequest) Distributed(store *ConfigurationStore) bool {
Sietse Ringers's avatar
Sietse Ringers committed
206
	for _, manager := range dr.SchemeManagers() {
207
		if store.SchemeManagers[manager].Distributed() {
Sietse Ringers's avatar
Sietse Ringers committed
208
209
210
211
212
213
			return true
		}
	}
	return false
}

214
// SchemeManagers returns a list of all scheme managers involved in this session.
Sietse Ringers's avatar
Sietse Ringers committed
215
216
217
218
219
220
221
222
223
224
func (dr *DisclosureRequest) SchemeManagers() []SchemeManagerIdentifier {
	list := []SchemeManagerIdentifier{}
	for _, disjunction := range dr.Content {
		for _, attr := range disjunction.Attributes {
			list = append(list, attr.CredentialTypeIdentifier().IssuerIdentifier().SchemeManagerIdentifier())
		}
	}
	return list
}

Sietse Ringers's avatar
Sietse Ringers committed
225
226
// ToDisclose returns the attributes to be disclosed in this session.
func (dr *DisclosureRequest) ToDisclose() AttributeDisjunctionList { return dr.Content }
Sietse Ringers's avatar
Sietse Ringers committed
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241

// GetContext returns the context of this session.
func (dr *DisclosureRequest) GetContext() *big.Int { return dr.Context }

// SetContext sets the context of this session.
func (dr *DisclosureRequest) SetContext(context *big.Int) { dr.Context = context }

// GetNonce returns the nonce of this session.
func (dr *DisclosureRequest) GetNonce() *big.Int { return dr.Nonce }

// SetNonce sets the nonce of this session.
func (dr *DisclosureRequest) SetNonce(nonce *big.Int) { dr.Nonce = nonce }

// GetNonce returns the nonce of this signature session
// (with the message already hashed into it).
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
func (sr *SignatureRequest) GetNonce() *big.Int {
	hashbytes := sha256.Sum256([]byte(sr.Message))
	hashint := new(big.Int).SetBytes(hashbytes[:])
	// TODO the 2 should be abstracted away
	asn1bytes, err := asn1.Marshal([]interface{}{big.NewInt(2), sr.Nonce, hashint})
	if err != nil {
		log.Print(err) // TODO? does this happen?
	}
	asn1hash := sha256.Sum256(asn1bytes)
	return new(big.Int).SetBytes(asn1hash[:])
}

// MarshalJSON marshals a timestamp.
func (t *Timestamp) MarshalJSON() ([]byte, error) {
	ts := time.Time(*t).Unix()
	stamp := fmt.Sprint(ts)
	return []byte(stamp), nil
}

// UnmarshalJSON unmarshals a timestamp.
func (t *Timestamp) UnmarshalJSON(b []byte) error {
	ts, err := strconv.Atoi(string(b))
	if err != nil {
		return err
	}
	*t = Timestamp(time.Unix(int64(ts), 0))
	return nil
}
Sietse Ringers's avatar
Sietse Ringers committed
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308

// NewServiceProviderJwt returns a new ServiceProviderJwt.
func NewServiceProviderJwt(servername string, dr *DisclosureRequest) *ServiceProviderJwt {
	return &ServiceProviderJwt{
		ServerJwt: ServerJwt{
			ServerName: servername,
			IssuedAt:   Timestamp(time.Now()),
			Type:       "verification_request",
		},
		Request: ServiceProviderRequest{Request: dr},
	}
}

// NewSignatureRequestorJwt returns a new SignatureRequestorJwt.
func NewSignatureRequestorJwt(servername string, sr *SignatureRequest) *SignatureRequestorJwt {
	return &SignatureRequestorJwt{
		ServerJwt: ServerJwt{
			ServerName: servername,
			IssuedAt:   Timestamp(time.Now()),
			Type:       "signature_request",
		},
		Request: SignatureRequestorRequest{Request: sr},
	}
}

// NewIdentityProviderJwt returns a new IdentityProviderJwt.
func NewIdentityProviderJwt(servername string, ir *IssuanceRequest) *IdentityProviderJwt {
	return &IdentityProviderJwt{
		ServerJwt: ServerJwt{
			ServerName: servername,
			IssuedAt:   Timestamp(time.Now()),
			Type:       "issue_request",
		},
		Request: IdentityProviderRequest{Request: ir},
	}
}

// A RequestorJwt contains an IRMA session object.
type RequestorJwt interface {
309
	IrmaSession() IrmaSession
Sietse Ringers's avatar
Sietse Ringers committed
310
311
312
}

// IrmaSession returns an IRMA session object.
313
func (jwt *ServiceProviderJwt) IrmaSession() IrmaSession { return jwt.Request.Request }
Sietse Ringers's avatar
Sietse Ringers committed
314
315

// IrmaSession returns an IRMA session object.
316
func (jwt *SignatureRequestorJwt) IrmaSession() IrmaSession { return jwt.Request.Request }
Sietse Ringers's avatar
Sietse Ringers committed
317
318

// IrmaSession returns an IRMA session object.
319
func (jwt *IdentityProviderJwt) IrmaSession() IrmaSession { return jwt.Request.Request }