How to sign and verfiy with mbedtls

Pedrojdi
Posts: 9
Joined: Mon Mar 08, 2021 2:14 pm

How to sign and verfiy with mbedtls

Postby Pedrojdi » Thu Mar 11, 2021 11:04 pm

How to use the following functions in the right way.
I generated the token through the code made available by Kolban at the link https://github.com/nkolban/esp32-snippe ... ud/GCP/JWT

The signing process worked just fine because testing on the website https://jwt.io where it can be verified by the public key without problems
In my code, the verification process always returns an error code. What would you be doing wrong:

Token generated with the code written by Kolban

Code: Select all

JWT: eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJpYXQiOjYyNCwiZXhwIjo2MjUsImF1ZCI6IkNUMDAwV2lmaSJ9.nOLmJbXeFxeaHM6uJDfQBiYRhO1aVyVs8pB-0MnTna89rd3DbBLb33gYnUD959inkrqHflObfcM_FyyuYSh38X7q_oAByy3zBFN7tojHS_GO5Gg0Rj2HaNhRS1SexA2uDGWiJIUXiVO3QH8aQ2XArrAU0UbMOiUCBSMKLcgXrnAhEBdaeaXPcU_bpwi_xCPhifytKx6bxcyspEvoPS4DEvKg46nE3ES_cUEjqtAkSXSRswWO2CYaeHnPNv_F7vLtbOAjeraFqhfIALLnpiW-utPQDk3ytWnzPz0LqzyU7Rh0G4Vi4yIPgmjqz0sCifRLRvqq6RmtauraSkVSnsUSng
This is a code test that I am doing to validate the token JWT signature but it always accuses me of failure in mbedtls_pk_verify (-14592 (-0x3900): PK - The buffer contains a valid signature followed by more data)

Code: Select all

         //Part of the public key
         static const char* msg2 = \
         "-----BEGIN PUBLIC KEY-----\n"\
	"MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyyGMMzLbck/wfrKK51lc\n"\
        "WdLXAAdoce8biRhL48343Z4a10Q3umgltJf19hC9mvcjpr59Kj9G0S29Teh3wL67\n"\
        "vQIDAQAB\n"\
        "-----END PUBLIC KEY-----\0";

        int l1 = strlen(msg2)+1;
        uint8_t* publicKey = new uint8_t[l1];
        memcpy(publicKey, msg2, l1);
        size_t publicKeySize = l1;
          
          int ret = 0;
          mbedtls_pk_context pk_context2;
          mbedtls_pk_init(&pk_context2);
          int rc9 = mbedtls_pk_parse_public_key(&pk_context2, publicKey, publicKeySize);
          if (rc9 != 0) {
              printf("Failed to mbedtls_pk_parse_key: %d (-0x%x): %s\n", rc, -rc, mbedtlsError(rc9));
              return nullptr;
          }
                   
          ret = mbedtls_pk_verify(&pk_context2,  MBEDTLS_MD_SHA256,  digest, sizeof(digest), oBuf,  sizeof(oBuf));
	  if (ret != 0) {
               printf("Invalid\n\r");
               printf("%d (-0x%x): %s\n", ret, -ret, mbedtlsError(ret));
       	   } else {
               printf("Valid\n\r");
           }
Code generated by Kolban for the creation of the JWT token

Code: Select all

#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <stdint.h>
#include <mbedtls/pk.h>
#include <mbedtls/error.h>
#include <mbedtls/entropy.h>
#include <mbedtls/ctr_drbg.h>
#include <esp_wifi.h>
#include <esp_system.h>
#include <esp_event.h>
#include <esp_event_loop.h>
#include <nvs_flash.h>
#include <tcpip_adapter.h>
#include <esp_err.h>
#include <freertos/FreeRTOS.h>
#include <freertos/task.h>
#include <apps/sntp/sntp.h>

#include "passwords.h"
#include "base64url.h"

// This is an "xxd" file of the PEM of the private key.
#include "device1_private_pem.h"


extern "C" {
    void app_main();
}

/**
 * Return a string representation of an mbedtls error code
 */
static char* mbedtlsError(int errnum) {
    static char buffer[200];
    mbedtls_strerror(errnum, buffer, sizeof(buffer));
    return buffer;
} // mbedtlsError


/**
 * Create a JWT token for GCP.
 * For full details, perform a Google search on JWT.  However, in summary, we build two strings.  One that represents the
 * header and one that represents the payload.  Both are JSON and are as described in the GCP and JWT documentation.  Next
 * we base64url encode both strings.  Note that is distinct from normal/simple base64 encoding.  Once we have a string for
 * the base64url encoding of both header and payload, we concatenate both strings together separated by a ".".   This resulting
 * string is then signed using RSASSA which basically produces an SHA256 message digest that is then signed.  The resulting
 * binary is then itself converted into base64url and concatenated with the previously built base64url combined header and
 * payload and that is our resulting JWT token.
 * @param projectId The GCP project.
 * @param privateKey The PEM or DER of the private key.
 * @param privateKeySize The size in bytes of the private key.
 * @returns A JWT token for transmission to GCP.
 */
char* createGCPJWT(const char* projectId, uint8_t* privateKey, size_t privateKeySize) {
    char base64Header[100];
    const char header[] = "{\"alg\":\"RS256\",\"typ\":\"JWT\"}";
    base64url_encode(
        (unsigned char *)header,   // Data to encode.
        strlen(header),            // Length of data to encode.
        base64Header);             // Base64 encoded data.

    time_t now;
    time(&now);
    uint32_t iat = now;              // Set the time now.
    uint32_t exp = iat + 60*60;      // Set the expiry time.

    char payload[100];
    sprintf(payload, "{\"iat\":%d,\"exp\":%d,\"aud\":\"%s\"}", iat, exp, projectId);

    char base64Payload[100];
    base64url_encode(
        (unsigned char *)payload,  // Data to encode.
        strlen(payload),           // Length of data to encode.
        base64Payload);            // Base64 encoded data.

    uint8_t headerAndPayload[800];
    sprintf((char*)headerAndPayload, "%s.%s", base64Header, base64Payload);

    // At this point we have created the header and payload parts, converted both to base64 and concatenated them
    // together as a single string.  Now we need to sign them using RSASSA

    mbedtls_pk_context pk_context;
    mbedtls_pk_init(&pk_context);
    int rc = mbedtls_pk_parse_key(&pk_context, privateKey, privateKeySize, NULL, 0);
    if (rc != 0) {
        printf("Failed to mbedtls_pk_parse_key: %d (-0x%x): %s\n", rc, -rc, mbedtlsError(rc));
        return nullptr;
    }

    uint8_t oBuf[5000];

    mbedtls_entropy_context entropy;
    mbedtls_ctr_drbg_context ctr_drbg;
    mbedtls_ctr_drbg_init(&ctr_drbg);
    mbedtls_entropy_init(&entropy);

    const char* pers="MyEntropy";
                
    mbedtls_ctr_drbg_seed(
        &ctr_drbg,
        mbedtls_entropy_func,
        &entropy,
        (const unsigned char*)pers,
        strlen(pers));
    

    uint8_t digest[32];
    rc = mbedtls_md(mbedtls_md_info_from_type(MBEDTLS_MD_SHA256), headerAndPayload, strlen((char*)headerAndPayload), digest);
    if (rc != 0) {
        printf("Failed to mbedtls_md: %d (-0x%x): %s\n", rc, -rc, mbedtlsError(rc));
        return nullptr;        
    }

    size_t retSize;
    rc = mbedtls_pk_sign(&pk_context, MBEDTLS_MD_SHA256, digest, sizeof(digest), oBuf, &retSize, mbedtls_ctr_drbg_random, &ctr_drbg);
    if (rc != 0) {
        printf("Failed to mbedtls_pk_sign: %d (-0x%x): %s\n", rc, -rc, mbedtlsError(rc));
        return nullptr;        
    }


    char base64Signature[600];
    base64url_encode((unsigned char *)oBuf, retSize, base64Signature);

    char* retData = (char*)malloc(strlen((char*)headerAndPayload) + 1 + strlen((char*)base64Signature) + 1);

    sprintf(retData, "%s.%s", headerAndPayload, base64Signature);

    mbedtls_pk_free(&pk_context);
    return retData;
}

void run(void *) {
    printf("Task starting!\n");
    const char* projectId = "test-214415";
    sntp_setoperatingmode(SNTP_OPMODE_POLL);
    sntp_setservername(0, "time-a-g.nist.gov");
    sntp_init();
    // https://www.epochconverter.com/
    time_t now = 0;
    time(&now);
    while(now < 5000) {
        vTaskDelay(1000 * portTICK_RATE_MS);
        time(&now);
    }

    char* jwt = createGCPJWT(projectId, device1_private_pem, device1_private_pem_len);
    if (jwt != nullptr) {
        printf("JWT: %s\n", jwt);
        free(jwt);
    }
    vTaskDelete(nullptr);
}

esp_err_t event_handler(void *ctx, system_event_t *event)
{
   if (event->event_id == SYSTEM_EVENT_STA_GOT_IP) {
      printf("Our IP address is " IPSTR "\n",
         IP2STR(&event->event_info.got_ip.ip_info.ip));
      printf("We have now connected to a station and can do things...\n");
      xTaskCreate(run, "run", 16000, nullptr, 0, nullptr);

   }

   if (event->event_id == SYSTEM_EVENT_STA_START) {
      ESP_ERROR_CHECK(esp_wifi_connect());
   }
   return ESP_OK;
}

void app_main(void)
{
    printf("Starting\n");
    nvs_flash_init();
    tcpip_adapter_init();
    ESP_ERROR_CHECK(esp_event_loop_init(event_handler, NULL));
    wifi_init_config_t cfg = WIFI_INIT_CONFIG_DEFAULT();
    ESP_ERROR_CHECK(esp_wifi_init(&cfg));
    ESP_ERROR_CHECK(esp_wifi_set_storage(WIFI_STORAGE_RAM));
    ESP_ERROR_CHECK(esp_wifi_set_mode(WIFI_MODE_STA));
    wifi_config_t sta_config;
    memset(&sta_config, 0, sizeof(sta_config));
    strcpy((char*)sta_config.sta.ssid, SSID);
    strcpy((char*)sta_config.sta.password, SSID_PASSWORD);
    ESP_ERROR_CHECK(esp_wifi_set_config(WIFI_IF_STA, &sta_config));
    ESP_ERROR_CHECK(esp_wifi_start());
}

svenbieg
Posts: 39
Joined: Tue Feb 11, 2020 5:48 pm

Re: How to sign and verfiy with mbedtls

Postby svenbieg » Sun Aug 14, 2022 2:51 pm

Your l1 is strlen(key)+1, the size of the key should be strlen(key) without the trailing 0.

Who is online

Users browsing this forum: Baidu [Spider], iParcelBox and 57 guests