aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/libs/jwt-cpp
diff options
context:
space:
mode:
authororivej <orivej@yandex-team.ru>2022-02-10 16:44:49 +0300
committerDaniil Cherednik <dcherednik@yandex-team.ru>2022-02-10 16:44:49 +0300
commit718c552901d703c502ccbefdfc3c9028d608b947 (patch)
tree46534a98bbefcd7b1f3faa5b52c138ab27db75b7 /contrib/libs/jwt-cpp
parente9656aae26e0358d5378e5b63dcac5c8dbe0e4d0 (diff)
downloadydb-718c552901d703c502ccbefdfc3c9028d608b947.tar.gz
Restoring authorship annotation for <orivej@yandex-team.ru>. Commit 1 of 2.
Diffstat (limited to 'contrib/libs/jwt-cpp')
-rw-r--r--contrib/libs/jwt-cpp/LICENSE42
-rw-r--r--contrib/libs/jwt-cpp/base.h336
-rw-r--r--contrib/libs/jwt-cpp/jwt.h3098
-rw-r--r--contrib/libs/jwt-cpp/picojson.h2332
-rw-r--r--contrib/libs/jwt-cpp/ya.make30
5 files changed, 2919 insertions, 2919 deletions
diff --git a/contrib/libs/jwt-cpp/LICENSE b/contrib/libs/jwt-cpp/LICENSE
index 7d583cecd8..a06d59df75 100644
--- a/contrib/libs/jwt-cpp/LICENSE
+++ b/contrib/libs/jwt-cpp/LICENSE
@@ -1,21 +1,21 @@
-MIT License
-
-Copyright (c) 2018 Dominik Thalhammer
-
-Permission is hereby granted, free of charge, to any person obtaining a copy
-of this software and associated documentation files (the "Software"), to deal
-in the Software without restriction, including without limitation the rights
-to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
-copies of the Software, and to permit persons to whom the Software is
-furnished to do so, subject to the following conditions:
-
-The above copyright notice and this permission notice shall be included in all
-copies or substantial portions of the Software.
-
-THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
-IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
-FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
-AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
-LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
-SOFTWARE.
+MIT License
+
+Copyright (c) 2018 Dominik Thalhammer
+
+Permission is hereby granted, free of charge, to any person obtaining a copy
+of this software and associated documentation files (the "Software"), to deal
+in the Software without restriction, including without limitation the rights
+to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+copies of the Software, and to permit persons to whom the Software is
+furnished to do so, subject to the following conditions:
+
+The above copyright notice and this permission notice shall be included in all
+copies or substantial portions of the Software.
+
+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
+SOFTWARE.
diff --git a/contrib/libs/jwt-cpp/base.h b/contrib/libs/jwt-cpp/base.h
index dfca7fc08f..5374bbe15d 100644
--- a/contrib/libs/jwt-cpp/base.h
+++ b/contrib/libs/jwt-cpp/base.h
@@ -1,168 +1,168 @@
-#pragma once
-#include <string>
-#include <array>
-
-namespace jwt {
- namespace alphabet {
- struct base64 {
- static const std::array<char, 64>& data() {
- static std::array<char, 64> data = {
- {'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P',
- 'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', 'Y', 'Z', 'a', 'b', 'c', 'd', 'e', 'f',
- 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v',
- 'w', 'x', 'y', 'z', '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', '+', '/'}};
- return data;
- };
- static const std::string& fill() {
- static std::string fill = "=";
- return fill;
- }
- };
- struct base64url {
- static const std::array<char, 64>& data() {
- static std::array<char, 64> data = {
- {'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P',
- 'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', 'Y', 'Z', 'a', 'b', 'c', 'd', 'e', 'f',
- 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v',
- 'w', 'x', 'y', 'z', '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', '-', '_'}};
- return data;
- };
- static const std::string& fill() {
- static std::string fill = "%3d";
- return fill;
- }
- };
- }
-
- class base {
- public:
- template<typename T>
- static std::string encode(const std::string& bin) {
- return encode(bin, T::data(), T::fill());
- }
- template<typename T>
- static std::string decode(const std::string& base) {
- return decode(base, T::data(), T::fill());
- }
-
- private:
- static std::string encode(const std::string& bin, const std::array<char, 64>& alphabet, const std::string& fill) {
- size_t size = bin.size();
- std::string res;
-
- // clear incomplete bytes
- size_t fast_size = size - size % 3;
- for (size_t i = 0; i < fast_size;) {
- uint32_t octet_a = (unsigned char)bin[i++];
- uint32_t octet_b = (unsigned char)bin[i++];
- uint32_t octet_c = (unsigned char)bin[i++];
-
- uint32_t triple = (octet_a << 0x10) + (octet_b << 0x08) + octet_c;
-
- res += alphabet[(triple >> 3 * 6) & 0x3F];
- res += alphabet[(triple >> 2 * 6) & 0x3F];
- res += alphabet[(triple >> 1 * 6) & 0x3F];
- res += alphabet[(triple >> 0 * 6) & 0x3F];
- }
-
- if (fast_size == size)
- return res;
-
- size_t mod = size % 3;
-
- uint32_t octet_a = fast_size < size ? (unsigned char)bin[fast_size++] : 0;
- uint32_t octet_b = fast_size < size ? (unsigned char)bin[fast_size++] : 0;
- uint32_t octet_c = fast_size < size ? (unsigned char)bin[fast_size++] : 0;
-
- uint32_t triple = (octet_a << 0x10) + (octet_b << 0x08) + octet_c;
-
- switch (mod) {
- case 1:
- res += alphabet[(triple >> 3 * 6) & 0x3F];
- res += alphabet[(triple >> 2 * 6) & 0x3F];
- res += fill;
- res += fill;
- break;
- case 2:
- res += alphabet[(triple >> 3 * 6) & 0x3F];
- res += alphabet[(triple >> 2 * 6) & 0x3F];
- res += alphabet[(triple >> 1 * 6) & 0x3F];
- res += fill;
- break;
- default:
- break;
- }
-
- return res;
- }
-
- static std::string decode(const std::string& base, const std::array<char, 64>& alphabet, const std::string& fill) {
- size_t size = base.size();
-
- size_t fill_cnt = 0;
- while (size > fill.size()) {
- if (base.substr(size - fill.size(), fill.size()) == fill) {
- fill_cnt++;
- size -= fill.size();
- if(fill_cnt > 2)
- throw std::runtime_error("Invalid input");
- }
- else break;
- }
-
- if ((size + fill_cnt) % 4 != 0)
- throw std::runtime_error("Invalid input");
-
- size_t out_size = size / 4 * 3;
- std::string res;
- res.reserve(out_size);
-
- auto get_sextet = [&](size_t offset) {
- for (size_t i = 0; i < alphabet.size(); i++) {
- if (alphabet[i] == base[offset])
- return i;
- }
- throw std::runtime_error("Invalid input");
- };
-
-
- size_t fast_size = size - size % 4;
- for (size_t i = 0; i < fast_size;) {
- uint32_t sextet_a = get_sextet(i++);
- uint32_t sextet_b = get_sextet(i++);
- uint32_t sextet_c = get_sextet(i++);
- uint32_t sextet_d = get_sextet(i++);
-
- uint32_t triple = (sextet_a << 3 * 6)
- + (sextet_b << 2 * 6)
- + (sextet_c << 1 * 6)
- + (sextet_d << 0 * 6);
-
- res += (triple >> 2 * 8) & 0xFF;
- res += (triple >> 1 * 8) & 0xFF;
- res += (triple >> 0 * 8) & 0xFF;
- }
-
- if (fill_cnt == 0)
- return res;
-
- uint32_t triple = (get_sextet(fast_size) << 3 * 6)
- + (get_sextet(fast_size + 1) << 2 * 6);
-
- switch (fill_cnt) {
- case 1:
- triple |= (get_sextet(fast_size + 2) << 1 * 6);
- res += (triple >> 2 * 8) & 0xFF;
- res += (triple >> 1 * 8) & 0xFF;
- break;
- case 2:
- res += (triple >> 2 * 8) & 0xFF;
- break;
- default:
- break;
- }
-
- return res;
- }
- };
-}
+#pragma once
+#include <string>
+#include <array>
+
+namespace jwt {
+ namespace alphabet {
+ struct base64 {
+ static const std::array<char, 64>& data() {
+ static std::array<char, 64> data = {
+ {'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P',
+ 'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', 'Y', 'Z', 'a', 'b', 'c', 'd', 'e', 'f',
+ 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v',
+ 'w', 'x', 'y', 'z', '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', '+', '/'}};
+ return data;
+ };
+ static const std::string& fill() {
+ static std::string fill = "=";
+ return fill;
+ }
+ };
+ struct base64url {
+ static const std::array<char, 64>& data() {
+ static std::array<char, 64> data = {
+ {'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P',
+ 'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', 'Y', 'Z', 'a', 'b', 'c', 'd', 'e', 'f',
+ 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v',
+ 'w', 'x', 'y', 'z', '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', '-', '_'}};
+ return data;
+ };
+ static const std::string& fill() {
+ static std::string fill = "%3d";
+ return fill;
+ }
+ };
+ }
+
+ class base {
+ public:
+ template<typename T>
+ static std::string encode(const std::string& bin) {
+ return encode(bin, T::data(), T::fill());
+ }
+ template<typename T>
+ static std::string decode(const std::string& base) {
+ return decode(base, T::data(), T::fill());
+ }
+
+ private:
+ static std::string encode(const std::string& bin, const std::array<char, 64>& alphabet, const std::string& fill) {
+ size_t size = bin.size();
+ std::string res;
+
+ // clear incomplete bytes
+ size_t fast_size = size - size % 3;
+ for (size_t i = 0; i < fast_size;) {
+ uint32_t octet_a = (unsigned char)bin[i++];
+ uint32_t octet_b = (unsigned char)bin[i++];
+ uint32_t octet_c = (unsigned char)bin[i++];
+
+ uint32_t triple = (octet_a << 0x10) + (octet_b << 0x08) + octet_c;
+
+ res += alphabet[(triple >> 3 * 6) & 0x3F];
+ res += alphabet[(triple >> 2 * 6) & 0x3F];
+ res += alphabet[(triple >> 1 * 6) & 0x3F];
+ res += alphabet[(triple >> 0 * 6) & 0x3F];
+ }
+
+ if (fast_size == size)
+ return res;
+
+ size_t mod = size % 3;
+
+ uint32_t octet_a = fast_size < size ? (unsigned char)bin[fast_size++] : 0;
+ uint32_t octet_b = fast_size < size ? (unsigned char)bin[fast_size++] : 0;
+ uint32_t octet_c = fast_size < size ? (unsigned char)bin[fast_size++] : 0;
+
+ uint32_t triple = (octet_a << 0x10) + (octet_b << 0x08) + octet_c;
+
+ switch (mod) {
+ case 1:
+ res += alphabet[(triple >> 3 * 6) & 0x3F];
+ res += alphabet[(triple >> 2 * 6) & 0x3F];
+ res += fill;
+ res += fill;
+ break;
+ case 2:
+ res += alphabet[(triple >> 3 * 6) & 0x3F];
+ res += alphabet[(triple >> 2 * 6) & 0x3F];
+ res += alphabet[(triple >> 1 * 6) & 0x3F];
+ res += fill;
+ break;
+ default:
+ break;
+ }
+
+ return res;
+ }
+
+ static std::string decode(const std::string& base, const std::array<char, 64>& alphabet, const std::string& fill) {
+ size_t size = base.size();
+
+ size_t fill_cnt = 0;
+ while (size > fill.size()) {
+ if (base.substr(size - fill.size(), fill.size()) == fill) {
+ fill_cnt++;
+ size -= fill.size();
+ if(fill_cnt > 2)
+ throw std::runtime_error("Invalid input");
+ }
+ else break;
+ }
+
+ if ((size + fill_cnt) % 4 != 0)
+ throw std::runtime_error("Invalid input");
+
+ size_t out_size = size / 4 * 3;
+ std::string res;
+ res.reserve(out_size);
+
+ auto get_sextet = [&](size_t offset) {
+ for (size_t i = 0; i < alphabet.size(); i++) {
+ if (alphabet[i] == base[offset])
+ return i;
+ }
+ throw std::runtime_error("Invalid input");
+ };
+
+
+ size_t fast_size = size - size % 4;
+ for (size_t i = 0; i < fast_size;) {
+ uint32_t sextet_a = get_sextet(i++);
+ uint32_t sextet_b = get_sextet(i++);
+ uint32_t sextet_c = get_sextet(i++);
+ uint32_t sextet_d = get_sextet(i++);
+
+ uint32_t triple = (sextet_a << 3 * 6)
+ + (sextet_b << 2 * 6)
+ + (sextet_c << 1 * 6)
+ + (sextet_d << 0 * 6);
+
+ res += (triple >> 2 * 8) & 0xFF;
+ res += (triple >> 1 * 8) & 0xFF;
+ res += (triple >> 0 * 8) & 0xFF;
+ }
+
+ if (fill_cnt == 0)
+ return res;
+
+ uint32_t triple = (get_sextet(fast_size) << 3 * 6)
+ + (get_sextet(fast_size + 1) << 2 * 6);
+
+ switch (fill_cnt) {
+ case 1:
+ triple |= (get_sextet(fast_size + 2) << 1 * 6);
+ res += (triple >> 2 * 8) & 0xFF;
+ res += (triple >> 1 * 8) & 0xFF;
+ break;
+ case 2:
+ res += (triple >> 2 * 8) & 0xFF;
+ break;
+ default:
+ break;
+ }
+
+ return res;
+ }
+ };
+}
diff --git a/contrib/libs/jwt-cpp/jwt.h b/contrib/libs/jwt-cpp/jwt.h
index a8c94c0c65..431f5825a5 100644
--- a/contrib/libs/jwt-cpp/jwt.h
+++ b/contrib/libs/jwt-cpp/jwt.h
@@ -1,1549 +1,1549 @@
-#pragma once
-#define PICOJSON_USE_INT64
-#include "picojson.h"
-#include "base.h"
-#include <set>
-#include <chrono>
-#include <unordered_map>
-#include <memory>
-#include <openssl/evp.h>
-#include <openssl/hmac.h>
-#include <openssl/pem.h>
-#include <openssl/ec.h>
-#include <openssl/err.h>
-
-//If openssl version less than 1.1
-#if OPENSSL_VERSION_NUMBER < 269484032
-#define OPENSSL10
-#endif
-
-#ifndef JWT_CLAIM_EXPLICIT
-#define JWT_CLAIM_EXPLICIT 0
-#endif
-
-namespace jwt {
- using date = std::chrono::system_clock::time_point;
-
- struct signature_verification_exception : public std::runtime_error {
- signature_verification_exception()
- : std::runtime_error("signature verification failed")
- {}
- explicit signature_verification_exception(const std::string& msg)
- : std::runtime_error(msg)
- {}
- explicit signature_verification_exception(const char* msg)
- : std::runtime_error(msg)
- {}
- };
- struct signature_generation_exception : public std::runtime_error {
- signature_generation_exception()
- : std::runtime_error("signature generation failed")
- {}
- explicit signature_generation_exception(const std::string& msg)
- : std::runtime_error(msg)
- {}
- explicit signature_generation_exception(const char* msg)
- : std::runtime_error(msg)
- {}
- };
- struct rsa_exception : public std::runtime_error {
- explicit rsa_exception(const std::string& msg)
- : std::runtime_error(msg)
- {}
- explicit rsa_exception(const char* msg)
- : std::runtime_error(msg)
- {}
- };
- struct ecdsa_exception : public std::runtime_error {
- explicit ecdsa_exception(const std::string& msg)
- : std::runtime_error(msg)
- {}
- explicit ecdsa_exception(const char* msg)
- : std::runtime_error(msg)
- {}
- };
- struct token_verification_exception : public std::runtime_error {
- token_verification_exception()
- : std::runtime_error("token verification failed")
- {}
- explicit token_verification_exception(const std::string& msg)
- : std::runtime_error("token verification failed: " + msg)
- {}
- };
-
- namespace algorithm {
- /**
- * "none" algorithm.
- *
- * Returns and empty signature and checks if the given signature is empty.
- */
- struct none {
- /// Return an empty string
- std::string sign(const std::string&) const {
- return "";
- }
- /// Check if the given signature is empty. JWT's with "none" algorithm should not contain a signature.
- void verify(const std::string&, const std::string& signature) const {
- if (!signature.empty())
- throw signature_verification_exception();
- }
- /// Get algorithm name
- std::string name() const {
- return "none";
- }
- };
- /**
- * Base class for HMAC family of algorithms
- */
- struct hmacsha {
- /**
- * Construct new hmac algorithm
- * \param key Key to use for HMAC
- * \param md Pointer to hash function
- * \param name Name of the algorithm
- */
- hmacsha(std::string key, const EVP_MD*(*md)(), const std::string& name)
- : secret(std::move(key)), md(md), alg_name(name)
- {}
- /**
- * Sign jwt data
- * \param data The data to sign
- * \return HMAC signature for the given data
- * \throws signature_generation_exception
- */
- std::string sign(const std::string& data) const {
- std::string res;
- res.resize(EVP_MAX_MD_SIZE);
- unsigned int len = res.size();
- if (HMAC(md(), secret.data(), secret.size(), (const unsigned char*)data.data(), data.size(), (unsigned char*)res.data(), &len) == nullptr)
- throw signature_generation_exception();
- res.resize(len);
- return res;
- }
- /**
- * Check if signature is valid
- * \param data The data to check signature against
- * \param signature Signature provided by the jwt
- * \throws signature_verification_exception If the provided signature does not match
- */
- void verify(const std::string& data, const std::string& signature) const {
- try {
- auto res = sign(data);
- bool matched = true;
- for (size_t i = 0; i < std::min<size_t>(res.size(), signature.size()); i++)
- if (res[i] != signature[i])
- matched = false;
- if (res.size() != signature.size())
- matched = false;
- if (!matched)
- throw signature_verification_exception();
- }
- catch (const signature_generation_exception&) {
- throw signature_verification_exception();
- }
- }
- /**
- * Returns the algorithm name provided to the constructor
- * \return Algorithmname
- */
- std::string name() const {
- return alg_name;
- }
- private:
- /// HMAC secrect
- const std::string secret;
- /// HMAC hash generator
- const EVP_MD*(*md)();
- /// Algorithmname
- const std::string alg_name;
- };
- /**
- * Base class for RSA family of algorithms
- */
- struct rsa {
- /**
- * Construct new rsa algorithm
- * \param public_key RSA public key in PEM format
- * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
- * \param public_key_password Password to decrypt public key pem.
- * \param privat_key_password Password to decrypt private key pem.
- * \param md Pointer to hash function
- * \param name Name of the algorithm
- */
- rsa(const std::string& public_key, const std::string& private_key, const std::string& public_key_password, const std::string& private_key_password, const EVP_MD*(*md)(), const std::string& name)
- : md(md), alg_name(name)
- {
- std::unique_ptr<BIO, decltype(&BIO_free_all)> pubkey_bio(BIO_new(BIO_s_mem()), BIO_free_all);
- if ((size_t)BIO_write(pubkey_bio.get(), public_key.data(), public_key.size()) != public_key.size())
- throw rsa_exception("failed to load public key: bio_write failed");
- pkey.reset(PEM_read_bio_PUBKEY(pubkey_bio.get(), nullptr, nullptr, (void*)public_key_password.c_str()), EVP_PKEY_free);
- if (!pkey)
- throw rsa_exception("failed to load public key: PEM_read_bio_PUBKEY failed");
-
- if (!private_key.empty()) {
- std::unique_ptr<BIO, decltype(&BIO_free_all)> privkey_bio(BIO_new(BIO_s_mem()), BIO_free_all);
- if ((size_t)BIO_write(privkey_bio.get(), private_key.data(), private_key.size()) != private_key.size())
- throw rsa_exception("failed to load private key: bio_write failed");
- RSA* privkey = PEM_read_bio_RSAPrivateKey(privkey_bio.get(), nullptr, nullptr, (void*)private_key_password.c_str());
- if (privkey == nullptr)
- throw rsa_exception("failed to load private key: PEM_read_bio_RSAPrivateKey failed");
- if (EVP_PKEY_assign_RSA(pkey.get(), privkey) == 0) {
- RSA_free(privkey);
- throw rsa_exception("failed to load private key: EVP_PKEY_assign_RSA failed");
- }
- }
- }
- /**
- * Sign jwt data
- * \param data The data to sign
- * \return RSA signature for the given data
- * \throws signature_generation_exception
- */
- std::string sign(const std::string& data) const {
-#ifdef OPENSSL10
- std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_destroy)> ctx(EVP_MD_CTX_create(), EVP_MD_CTX_destroy);
-#else
- std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_free)> ctx(EVP_MD_CTX_create(), EVP_MD_CTX_free);
-#endif
- if (!ctx)
- throw signature_generation_exception("failed to create signature: could not create context");
- if (!EVP_SignInit(ctx.get(), md()))
- throw signature_generation_exception("failed to create signature: SignInit failed");
-
- std::string res;
- res.resize(EVP_PKEY_size(pkey.get()));
- unsigned int len = 0;
-
- if (!EVP_SignUpdate(ctx.get(), data.data(), data.size()))
- throw signature_generation_exception();
- if (!EVP_SignFinal(ctx.get(), (unsigned char*)res.data(), &len, pkey.get()))
- throw signature_generation_exception();
-
- res.resize(len);
- return res;
- }
- /**
- * Check if signature is valid
- * \param data The data to check signature against
- * \param signature Signature provided by the jwt
- * \throws signature_verification_exception If the provided signature does not match
- */
- void verify(const std::string& data, const std::string& signature) const {
-#ifdef OPENSSL10
- std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_destroy)> ctx(EVP_MD_CTX_create(), EVP_MD_CTX_destroy);
-#else
- std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_free)> ctx(EVP_MD_CTX_create(), EVP_MD_CTX_free);
-#endif
- if (!ctx)
- throw signature_verification_exception("failed to verify signature: could not create context");
- if (!EVP_VerifyInit(ctx.get(), md()))
- throw signature_verification_exception("failed to verify signature: VerifyInit failed");
- if (!EVP_VerifyUpdate(ctx.get(), data.data(), data.size()))
- throw signature_verification_exception("failed to verify signature: VerifyUpdate failed");
- if (!EVP_VerifyFinal(ctx.get(), (const unsigned char*)signature.data(), signature.size(), pkey.get()))
- throw signature_verification_exception();
- }
- /**
- * Returns the algorithm name provided to the constructor
- * \return Algorithmname
- */
- std::string name() const {
- return alg_name;
- }
- private:
- /// OpenSSL structure containing converted keys
- std::shared_ptr<EVP_PKEY> pkey;
- /// Hash generator
- const EVP_MD*(*md)();
- /// Algorithmname
- const std::string alg_name;
- };
- /**
- * Base class for ECDSA family of algorithms
- */
- struct ecdsa {
- /**
- * Construct new ecdsa algorithm
- * \param public_key ECDSA public key in PEM format
- * \param private_key ECDSA private key or empty string if not available. If empty, signing will always fail.
- * \param public_key_password Password to decrypt public key pem.
- * \param privat_key_password Password to decrypt private key pem.
- * \param md Pointer to hash function
- * \param name Name of the algorithm
- */
- ecdsa(const std::string& public_key, const std::string& private_key, const std::string& public_key_password, const std::string& private_key_password, const EVP_MD*(*md)(), const std::string& name)
- : md(md), alg_name(name)
- {
- if (private_key.empty()) {
- std::unique_ptr<BIO, decltype(&BIO_free_all)> pubkey_bio(BIO_new(BIO_s_mem()), BIO_free_all);
- if ((size_t)BIO_write(pubkey_bio.get(), public_key.data(), public_key.size()) != public_key.size())
- throw ecdsa_exception("failed to load public key: bio_write failed");
-
- pkey.reset(PEM_read_bio_EC_PUBKEY(pubkey_bio.get(), nullptr, nullptr, (void*)public_key_password.c_str()), EC_KEY_free);
- if (!pkey)
- throw ecdsa_exception("failed to load public key: PEM_read_bio_EC_PUBKEY failed");
- } else {
- std::unique_ptr<BIO, decltype(&BIO_free_all)> privkey_bio(BIO_new(BIO_s_mem()), BIO_free_all);
- if ((size_t)BIO_write(privkey_bio.get(), private_key.data(), private_key.size()) != private_key.size())
- throw ecdsa_exception("failed to load private key: bio_write failed");
- pkey.reset(PEM_read_bio_ECPrivateKey(privkey_bio.get(), nullptr, nullptr, (void*)private_key_password.c_str()), EC_KEY_free);
- if (!pkey)
- throw ecdsa_exception("failed to load private key: PEM_read_bio_RSAPrivateKey failed");
- }
-
- if(EC_KEY_check_key(pkey.get()) == 0)
- throw ecdsa_exception("failed to load key: key is invalid");
- }
- /**
- * Sign jwt data
- * \param data The data to sign
- * \return ECDSA signature for the given data
- * \throws signature_generation_exception
- */
- std::string sign(const std::string& data) const {
- const std::string hash = generate_hash(data);
-
- std::unique_ptr<ECDSA_SIG, decltype(&ECDSA_SIG_free)>
- sig(ECDSA_do_sign((const unsigned char*)hash.data(), hash.size(), pkey.get()), ECDSA_SIG_free);
- if(!sig)
- throw signature_generation_exception();
-#ifdef OPENSSL10
-
- return bn2raw(sig->r) + bn2raw(sig->s);
-#else
- const BIGNUM *r;
- const BIGNUM *s;
- ECDSA_SIG_get0(sig.get(), &r, &s);
- return bn2raw(r) + bn2raw(s);
-#endif
- }
- /**
- * Check if signature is valid
- * \param data The data to check signature against
- * \param signature Signature provided by the jwt
- * \throws signature_verification_exception If the provided signature does not match
- */
- void verify(const std::string& data, const std::string& signature) const {
- const std::string hash = generate_hash(data);
- auto r = raw2bn(signature.substr(0, signature.size() / 2));
- auto s = raw2bn(signature.substr(signature.size() / 2));
-
-#ifdef OPENSSL10
- ECDSA_SIG sig;
- sig.r = r.get();
- sig.s = s.get();
-
- if(ECDSA_do_verify((const unsigned char*)hash.data(), hash.size(), &sig, pkey.get()) != 1)
- throw signature_verification_exception("Invalid signature");
-#else
- ECDSA_SIG *sig = ECDSA_SIG_new();
-
- ECDSA_SIG_set0(sig, r.get(), s.get());
-
- if(ECDSA_do_verify((const unsigned char*)hash.data(), hash.size(), sig, pkey.get()) != 1)
- throw signature_verification_exception("Invalid signature");
-#endif
- }
- /**
- * Returns the algorithm name provided to the constructor
- * \return Algorithmname
- */
- std::string name() const {
- return alg_name;
- }
- private:
- /**
- * Convert a OpenSSL BIGNUM to a std::string
- * \param bn BIGNUM to convert
- * \return bignum as string
- */
-#ifdef OPENSSL10
- static std::string bn2raw(BIGNUM* bn)
-#else
- static std::string bn2raw(const BIGNUM* bn)
-#endif
- {
- std::string res;
- res.resize(BN_num_bytes(bn));
- BN_bn2bin(bn, (unsigned char*)res.data());
- if(res.size()%2 == 1 && res[0] == 0x00)
- return res.substr(1);
- return res;
- }
- /**
- * Convert an std::string to a OpenSSL BIGNUM
- * \param raw String to convert
- * \return BIGNUM representation
- */
- static std::unique_ptr<BIGNUM, decltype(&BN_free)> raw2bn(const std::string& raw) {
- if(static_cast<uint8_t>(raw[0]) >= 0x80) {
- std::string str(1, 0x00);
- str += raw;
- return std::unique_ptr<BIGNUM, decltype(&BN_free)>(BN_bin2bn((const unsigned char*)str.data(), str.size(), nullptr), BN_free);
- }
- return std::unique_ptr<BIGNUM, decltype(&BN_free)>(BN_bin2bn((const unsigned char*)raw.data(), raw.size(), nullptr), BN_free);
- }
-
- /**
- * Hash the provided data using the hash function specified in constructor
- * \param data Data to hash
- * \return Hash of data
- */
- std::string generate_hash(const std::string& data) const {
-#ifdef OPENSSL10
- std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_destroy)> ctx(EVP_MD_CTX_create(), &EVP_MD_CTX_destroy);
-#else
- std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_free)> ctx(EVP_MD_CTX_new(), EVP_MD_CTX_free);
-#endif
- if(EVP_DigestInit(ctx.get(), md()) == 0)
- throw signature_generation_exception("EVP_DigestInit failed");
- if(EVP_DigestUpdate(ctx.get(), data.data(), data.size()) == 0)
- throw signature_generation_exception("EVP_DigestUpdate failed");
- unsigned int len = 0;
- std::string res;
- res.resize(EVP_MD_CTX_size(ctx.get()));
- if(EVP_DigestFinal(ctx.get(), (unsigned char*)res.data(), &len) == 0)
- throw signature_generation_exception("EVP_DigestFinal failed");
- res.resize(len);
- return res;
- }
-
- /// OpenSSL struct containing keys
- std::shared_ptr<EC_KEY> pkey;
- /// Hash generator function
- const EVP_MD*(*md)();
- /// Algorithmname
- const std::string alg_name;
- };
-
- /**
- * Base class for PSS-RSA family of algorithms
- */
- struct pss {
- /**
- * Construct new pss algorithm
- * \param public_key RSA public key in PEM format
- * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
- * \param public_key_password Password to decrypt public key pem.
- * \param privat_key_password Password to decrypt private key pem.
- * \param md Pointer to hash function
- * \param name Name of the algorithm
- */
- pss(const std::string& public_key, const std::string& private_key, const std::string& public_key_password, const std::string& private_key_password, const EVP_MD*(*md)(), const std::string& name)
- : md(md), alg_name(name)
- {
- std::unique_ptr<BIO, decltype(&BIO_free_all)> pubkey_bio(BIO_new(BIO_s_mem()), BIO_free_all);
- if ((size_t)BIO_write(pubkey_bio.get(), public_key.data(), public_key.size()) != public_key.size())
- throw rsa_exception("failed to load public key: bio_write failed");
- pkey.reset(PEM_read_bio_PUBKEY(pubkey_bio.get(), nullptr, nullptr, (void*)public_key_password.c_str()), EVP_PKEY_free);
- if (!pkey)
- throw rsa_exception("failed to load public key: PEM_read_bio_PUBKEY failed");
-
- if (!private_key.empty()) {
- std::unique_ptr<BIO, decltype(&BIO_free_all)> privkey_bio(BIO_new(BIO_s_mem()), BIO_free_all);
- if ((size_t)BIO_write(privkey_bio.get(), private_key.data(), private_key.size()) != private_key.size())
- throw rsa_exception("failed to load private key: bio_write failed");
- RSA* privkey = PEM_read_bio_RSAPrivateKey(privkey_bio.get(), nullptr, nullptr, (void*)private_key_password.c_str());
- if (privkey == nullptr)
- throw rsa_exception("failed to load private key: PEM_read_bio_RSAPrivateKey failed");
- if (EVP_PKEY_assign_RSA(pkey.get(), privkey) == 0) {
- RSA_free(privkey);
- throw rsa_exception("failed to load private key: EVP_PKEY_assign_RSA failed");
- }
- }
- }
- /**
- * Sign jwt data
- * \param data The data to sign
- * \return ECDSA signature for the given data
- * \throws signature_generation_exception
- */
- std::string sign(const std::string& data) const {
- auto hash = this->generate_hash(data);
-
- std::unique_ptr<RSA, decltype(&RSA_free)> key(EVP_PKEY_get1_RSA(pkey.get()), RSA_free);
- const int size = RSA_size(key.get());
-
- std::string padded(size, 0x00);
- if (!RSA_padding_add_PKCS1_PSS_mgf1(key.get(), (unsigned char*)padded.data(), (const unsigned char*)hash.data(), md(), md(), -1))
- throw signature_generation_exception("failed to create signature: RSA_padding_add_PKCS1_PSS_mgf1 failed");
-
- std::string res(size, 0x00);
- if (RSA_private_encrypt(size, (const unsigned char*)padded.data(), (unsigned char*)res.data(), key.get(), RSA_NO_PADDING) < 0)
- throw signature_generation_exception("failed to create signature: RSA_private_encrypt failed");
- return res;
- }
- /**
- * Check if signature is valid
- * \param data The data to check signature against
- * \param signature Signature provided by the jwt
- * \throws signature_verification_exception If the provided signature does not match
- */
- void verify(const std::string& data, const std::string& signature) const {
- auto hash = this->generate_hash(data);
-
- std::unique_ptr<RSA, decltype(&RSA_free)> key(EVP_PKEY_get1_RSA(pkey.get()), RSA_free);
- const int size = RSA_size(key.get());
-
- std::string sig(size, 0x00);
- if(!RSA_public_decrypt(signature.size(), (const unsigned char*)signature.data(), (unsigned char*)sig.data(), key.get(), RSA_NO_PADDING))
- throw signature_verification_exception("Invalid signature");
-
- if(!RSA_verify_PKCS1_PSS_mgf1(key.get(), (const unsigned char*)hash.data(), md(), md(), (const unsigned char*)sig.data(), -1))
- throw signature_verification_exception("Invalid signature");
- }
- /**
- * Returns the algorithm name provided to the constructor
- * \return Algorithmname
- */
- std::string name() const {
- return alg_name;
- }
- private:
- /**
- * Hash the provided data using the hash function specified in constructor
- * \param data Data to hash
- * \return Hash of data
- */
- std::string generate_hash(const std::string& data) const {
-#ifdef OPENSSL10
- std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_destroy)> ctx(EVP_MD_CTX_create(), &EVP_MD_CTX_destroy);
-#else
- std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_free)> ctx(EVP_MD_CTX_new(), EVP_MD_CTX_free);
-#endif
- if(EVP_DigestInit(ctx.get(), md()) == 0)
- throw signature_generation_exception("EVP_DigestInit failed");
- if(EVP_DigestUpdate(ctx.get(), data.data(), data.size()) == 0)
- throw signature_generation_exception("EVP_DigestUpdate failed");
- unsigned int len = 0;
- std::string res;
- res.resize(EVP_MD_CTX_size(ctx.get()));
- if(EVP_DigestFinal(ctx.get(), (unsigned char*)res.data(), &len) == 0)
- throw signature_generation_exception("EVP_DigestFinal failed");
- res.resize(len);
- return res;
- }
-
- /// OpenSSL structure containing keys
- std::shared_ptr<EVP_PKEY> pkey;
- /// Hash generator function
- const EVP_MD*(*md)();
- /// Algorithmname
- const std::string alg_name;
- };
-
- /**
- * HS256 algorithm
- */
- struct hs256 : public hmacsha {
- /**
- * Construct new instance of algorithm
- * \param key HMAC signing key
- */
- explicit hs256(std::string key)
- : hmacsha(std::move(key), EVP_sha256, "HS256")
- {}
- };
- /**
- * HS384 algorithm
- */
- struct hs384 : public hmacsha {
- /**
- * Construct new instance of algorithm
- * \param key HMAC signing key
- */
- explicit hs384(std::string key)
- : hmacsha(std::move(key), EVP_sha384, "HS384")
- {}
- };
- /**
- * HS512 algorithm
- */
- struct hs512 : public hmacsha {
- /**
- * Construct new instance of algorithm
- * \param key HMAC signing key
- */
- explicit hs512(std::string key)
- : hmacsha(std::move(key), EVP_sha512, "HS512")
- {}
- };
- /**
- * RS256 algorithm
- */
- struct rs256 : public rsa {
- /**
- * Construct new instance of algorithm
- * \param public_key RSA public key in PEM format
- * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
- * \param public_key_password Password to decrypt public key pem.
- * \param privat_key_password Password to decrypt private key pem.
- */
- rs256(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
- : rsa(public_key, private_key, public_key_password, private_key_password, EVP_sha256, "RS256")
- {}
- };
- /**
- * RS384 algorithm
- */
- struct rs384 : public rsa {
- /**
- * Construct new instance of algorithm
- * \param public_key RSA public key in PEM format
- * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
- * \param public_key_password Password to decrypt public key pem.
- * \param privat_key_password Password to decrypt private key pem.
- */
- rs384(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
- : rsa(public_key, private_key, public_key_password, private_key_password, EVP_sha384, "RS384")
- {}
- };
- /**
- * RS512 algorithm
- */
- struct rs512 : public rsa {
- /**
- * Construct new instance of algorithm
- * \param public_key RSA public key in PEM format
- * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
- * \param public_key_password Password to decrypt public key pem.
- * \param privat_key_password Password to decrypt private key pem.
- */
- rs512(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
- : rsa(public_key, private_key, public_key_password, private_key_password, EVP_sha512, "RS512")
- {}
- };
- /**
- * ES256 algorithm
- */
- struct es256 : public ecdsa {
- /**
- * Construct new instance of algorithm
- * \param public_key ECDSA public key in PEM format
- * \param private_key ECDSA private key or empty string if not available. If empty, signing will always fail.
- * \param public_key_password Password to decrypt public key pem.
- * \param privat_key_password Password to decrypt private key pem.
- */
- es256(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
- : ecdsa(public_key, private_key, public_key_password, private_key_password, EVP_sha256, "ES256")
- {}
- };
- /**
- * ES384 algorithm
- */
- struct es384 : public ecdsa {
- /**
- * Construct new instance of algorithm
- * \param public_key ECDSA public key in PEM format
- * \param private_key ECDSA private key or empty string if not available. If empty, signing will always fail.
- * \param public_key_password Password to decrypt public key pem.
- * \param privat_key_password Password to decrypt private key pem.
- */
- es384(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
- : ecdsa(public_key, private_key, public_key_password, private_key_password, EVP_sha384, "ES384")
- {}
- };
- /**
- * ES512 algorithm
- */
- struct es512 : public ecdsa {
- /**
- * Construct new instance of algorithm
- * \param public_key ECDSA public key in PEM format
- * \param private_key ECDSA private key or empty string if not available. If empty, signing will always fail.
- * \param public_key_password Password to decrypt public key pem.
- * \param privat_key_password Password to decrypt private key pem.
- */
- es512(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
- : ecdsa(public_key, private_key, public_key_password, private_key_password, EVP_sha512, "ES512")
- {}
- };
-
- /**
- * PS256 algorithm
- */
- struct ps256 : public pss {
- /**
- * Construct new instance of algorithm
- * \param public_key RSA public key in PEM format
- * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
- * \param public_key_password Password to decrypt public key pem.
- * \param privat_key_password Password to decrypt private key pem.
- */
- ps256(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
- : pss(public_key, private_key, public_key_password, private_key_password, EVP_sha256, "PS256")
- {}
- };
- /**
- * PS384 algorithm
- */
- struct ps384 : public pss {
- /**
- * Construct new instance of algorithm
- * \param public_key RSA public key in PEM format
- * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
- * \param public_key_password Password to decrypt public key pem.
- * \param privat_key_password Password to decrypt private key pem.
- */
- ps384(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
- : pss(public_key, private_key, public_key_password, private_key_password, EVP_sha384, "PS384")
- {}
- };
- /**
- * PS512 algorithm
- */
- struct ps512 : public pss {
- /**
- * Construct new instance of algorithm
- * \param public_key RSA public key in PEM format
- * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
- * \param public_key_password Password to decrypt public key pem.
- * \param privat_key_password Password to decrypt private key pem.
- */
- ps512(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
- : pss(public_key, private_key, public_key_password, private_key_password, EVP_sha512, "PS512")
- {}
- };
- }
-
- /**
- * Convenience wrapper for JSON value
- */
- class claim {
- picojson::value val;
- public:
- enum class type {
- null,
- boolean,
- number,
- string,
- array,
- object,
- int64
- };
-
- claim()
- : val()
- {}
-#if JWT_CLAIM_EXPLICIT
- explicit claim(std::string s)
- : val(std::move(s))
- {}
- explicit claim(const date& s)
- : val(int64_t(std::chrono::system_clock::to_time_t(s)))
- {}
- explicit claim(const std::set<std::string>& s)
- : val(picojson::array(s.cbegin(), s.cend()))
- {}
- explicit claim(const picojson::value& val)
- : val(val)
- {}
-#else
- claim(std::string s)
- : val(std::move(s))
- {}
- claim(const date& s)
- : val(int64_t(std::chrono::system_clock::to_time_t(s)))
- {}
- claim(const std::set<std::string>& s)
- : val(picojson::array(s.cbegin(), s.cend()))
- {}
- claim(const picojson::value& val)
- : val(val)
- {}
-#endif
-
- /**
- * Get wrapped json object
- * \return Wrapped json object
- */
- picojson::value to_json() const {
- return val;
- }
-
- /**
- * Get type of contained object
- * \return Type
- * \throws std::logic_error An internal error occured
- */
- type get_type() const {
- if (val.is<picojson::null>()) return type::null;
- else if (val.is<bool>()) return type::boolean;
- else if (val.is<int64_t>()) return type::int64;
- else if (val.is<double>()) return type::number;
- else if (val.is<std::string>()) return type::string;
- else if (val.is<picojson::array>()) return type::array;
- else if (val.is<picojson::object>()) return type::object;
- else throw std::logic_error("internal error");
- }
-
- /**
- * Get the contained object as a string
- * \return content as string
- * \throws std::bad_cast Content was not a string
- */
- const std::string& as_string() const {
- if (!val.is<std::string>())
- throw std::bad_cast();
- return val.get<std::string>();
- }
- /**
- * Get the contained object as a date
- * \return content as date
- * \throws std::bad_cast Content was not a date
- */
- date as_date() const {
- return std::chrono::system_clock::from_time_t(as_int());
- }
- /**
- * Get the contained object as an array
- * \return content as array
- * \throws std::bad_cast Content was not an array
- */
- const picojson::array& as_array() const {
- if (!val.is<picojson::array>())
- throw std::bad_cast();
- return val.get<picojson::array>();
- }
- /**
- * Get the contained object as a set of strings
- * \return content as set of strings
- * \throws std::bad_cast Content was not a set
- */
- const std::set<std::string> as_set() const {
- std::set<std::string> res;
- for(auto& e : as_array()) {
- if(!e.is<std::string>())
- throw std::bad_cast();
- res.insert(e.get<std::string>());
- }
- return res;
- }
- /**
- * Get the contained object as an integer
- * \return content as int
- * \throws std::bad_cast Content was not an int
- */
- int64_t as_int() const {
- if (!val.is<int64_t>())
- throw std::bad_cast();
- return val.get<int64_t>();
- }
- /**
- * Get the contained object as a bool
- * \return content as bool
- * \throws std::bad_cast Content was not a bool
- */
- bool as_bool() const {
- if (!val.is<bool>())
- throw std::bad_cast();
- return val.get<bool>();
- }
- /**
- * Get the contained object as a number
- * \return content as double
- * \throws std::bad_cast Content was not a number
- */
- double as_number() const {
- if (!val.is<double>())
- throw std::bad_cast();
- return val.get<double>();
- }
- };
-
- /**
- * Base class that represents a token payload.
- * Contains Convenience accessors for common claims.
- */
- class payload {
- protected:
- std::unordered_map<std::string, claim> payload_claims;
- public:
- /**
- * Check if issuer is present ("iss")
- * \return true if present, false otherwise
- */
- bool has_issuer() const noexcept { return has_payload_claim("iss"); }
- /**
- * Check if subject is present ("sub")
- * \return true if present, false otherwise
- */
- bool has_subject() const noexcept { return has_payload_claim("sub"); }
- /**
- * Check if audience is present ("aud")
- * \return true if present, false otherwise
- */
- bool has_audience() const noexcept { return has_payload_claim("aud"); }
- /**
- * Check if expires is present ("exp")
- * \return true if present, false otherwise
- */
- bool has_expires_at() const noexcept { return has_payload_claim("exp"); }
- /**
- * Check if not before is present ("nbf")
- * \return true if present, false otherwise
- */
- bool has_not_before() const noexcept { return has_payload_claim("nbf"); }
- /**
- * Check if issued at is present ("iat")
- * \return true if present, false otherwise
- */
- bool has_issued_at() const noexcept { return has_payload_claim("iat"); }
- /**
- * Check if token id is present ("jti")
- * \return true if present, false otherwise
- */
- bool has_id() const noexcept { return has_payload_claim("jti"); }
- /**
- * Get issuer claim
- * \return issuer as string
- * \throws std::runtime_error If claim was not present
- * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
- */
- const std::string& get_issuer() const { return get_payload_claim("iss").as_string(); }
- /**
- * Get subject claim
- * \return subject as string
- * \throws std::runtime_error If claim was not present
- * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
- */
- const std::string& get_subject() const { return get_payload_claim("sub").as_string(); }
- /**
- * Get audience claim
- * \return audience as a set of strings
- * \throws std::runtime_error If claim was not present
- * \throws std::bad_cast Claim was present but not a set (Should not happen in a valid token)
- */
- std::set<std::string> get_audience() const {
- auto aud = get_payload_claim("aud");
- if(aud.get_type() == jwt::claim::type::string) return { aud.as_string()};
- else return aud.as_set();
- }
- /**
- * Get expires claim
- * \return expires as a date in utc
- * \throws std::runtime_error If claim was not present
- * \throws std::bad_cast Claim was present but not a date (Should not happen in a valid token)
- */
- const date get_expires_at() const { return get_payload_claim("exp").as_date(); }
- /**
- * Get not valid before claim
- * \return nbf date in utc
- * \throws std::runtime_error If claim was not present
- * \throws std::bad_cast Claim was present but not a date (Should not happen in a valid token)
- */
- const date get_not_before() const { return get_payload_claim("nbf").as_date(); }
- /**
- * Get issued at claim
- * \return issued at as date in utc
- * \throws std::runtime_error If claim was not present
- * \throws std::bad_cast Claim was present but not a date (Should not happen in a valid token)
- */
- const date get_issued_at() const { return get_payload_claim("iat").as_date(); }
- /**
- * Get id claim
- * \return id as string
- * \throws std::runtime_error If claim was not present
- * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
- */
- const std::string& get_id() const { return get_payload_claim("jti").as_string(); }
- /**
- * Check if a payload claim is present
- * \return true if claim was present, false otherwise
- */
- bool has_payload_claim(const std::string& name) const noexcept { return payload_claims.count(name) != 0; }
- /**
- * Get payload claim
- * \return Requested claim
- * \throws std::runtime_error If claim was not present
- */
- const claim& get_payload_claim(const std::string& name) const {
- if (!has_payload_claim(name))
- throw std::runtime_error("claim not found");
- return payload_claims.at(name);
- }
- /**
- * Get all payload claims
- * \return map of claims
- */
- std::unordered_map<std::string, claim> get_payload_claims() const { return payload_claims; }
- };
-
- /**
- * Base class that represents a token header.
- * Contains Convenience accessors for common claims.
- */
- class header {
- protected:
- std::unordered_map<std::string, claim> header_claims;
- public:
- /**
- * Check if algortihm is present ("alg")
- * \return true if present, false otherwise
- */
- bool has_algorithm() const noexcept { return has_header_claim("alg"); }
- /**
- * Check if type is present ("typ")
- * \return true if present, false otherwise
- */
- bool has_type() const noexcept { return has_header_claim("typ"); }
- /**
- * Check if content type is present ("cty")
- * \return true if present, false otherwise
- */
- bool has_content_type() const noexcept { return has_header_claim("cty"); }
- /**
- * Check if key id is present ("kid")
- * \return true if present, false otherwise
- */
- bool has_key_id() const noexcept { return has_header_claim("kid"); }
- /**
- * Get algorithm claim
- * \return algorithm as string
- * \throws std::runtime_error If claim was not present
- * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
- */
- const std::string& get_algorithm() const { return get_header_claim("alg").as_string(); }
- /**
- * Get type claim
- * \return type as a string
- * \throws std::runtime_error If claim was not present
- * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
- */
- const std::string& get_type() const { return get_header_claim("typ").as_string(); }
- /**
- * Get content type claim
- * \return content type as string
- * \throws std::runtime_error If claim was not present
- * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
- */
- const std::string& get_content_type() const { return get_header_claim("cty").as_string(); }
- /**
- * Get key id claim
- * \return key id as string
- * \throws std::runtime_error If claim was not present
- * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
- */
- const std::string& get_key_id() const { return get_header_claim("kid").as_string(); }
- /**
- * Check if a header claim is present
- * \return true if claim was present, false otherwise
- */
- bool has_header_claim(const std::string& name) const noexcept { return header_claims.count(name) != 0; }
- /**
- * Get header claim
- * \return Requested claim
- * \throws std::runtime_error If claim was not present
- */
- const claim& get_header_claim(const std::string& name) const {
- if (!has_header_claim(name))
- throw std::runtime_error("claim not found");
- return header_claims.at(name);
- }
- /**
- * Get all header claims
- * \return map of claims
- */
- std::unordered_map<std::string, claim> get_header_claims() const { return header_claims; }
- };
-
- /**
- * Class containing all information about a decoded token
- */
- class decoded_jwt : public header, public payload {
- protected:
- /// Unmodifed token, as passed to constructor
- const std::string token;
- /// Header part decoded from base64
- std::string header;
- /// Unmodified header part in base64
- std::string header_base64;
- /// Payload part decoded from base64
- std::string payload;
- /// Unmodified payload part in base64
- std::string payload_base64;
- /// Signature part decoded from base64
- std::string signature;
- /// Unmodified signature part in base64
- std::string signature_base64;
- public:
- /**
- * Constructor
- * Parses a given token
- * \param token The token to parse
- * \throws std::invalid_argument Token is not in correct format
- * \throws std::runtime_error Base64 decoding failed or invalid json
- */
- explicit decoded_jwt(const std::string& token)
- : token(token)
- {
- auto hdr_end = token.find('.');
- if (hdr_end == std::string::npos)
- throw std::invalid_argument("invalid token supplied");
- auto payload_end = token.find('.', hdr_end + 1);
- if (payload_end == std::string::npos)
- throw std::invalid_argument("invalid token supplied");
- header = header_base64 = token.substr(0, hdr_end);
- payload = payload_base64 = token.substr(hdr_end + 1, payload_end - hdr_end - 1);
- signature = signature_base64 = token.substr(payload_end + 1);
-
- // Fix padding: JWT requires padding to get removed
- auto fix_padding = [](std::string& str) {
- switch (str.size() % 4) {
- case 1:
- str += alphabet::base64url::fill();
-#ifdef __cpp_attributes
-#if __has_cpp_attribute(fallthrough)
- [[fallthrough]];
-#endif
-#endif
- case 2:
- str += alphabet::base64url::fill();
-#ifdef __cpp_attributes
-#if __has_cpp_attribute(fallthrough)
- [[fallthrough]];
-#endif
-#endif
- case 3:
- str += alphabet::base64url::fill();
-#ifdef __cpp_attributes
-#if __has_cpp_attribute(fallthrough)
- [[fallthrough]];
-#endif
-#endif
- default:
- break;
- }
- };
- fix_padding(header);
- fix_padding(payload);
- fix_padding(signature);
-
- header = base::decode<alphabet::base64url>(header);
- payload = base::decode<alphabet::base64url>(payload);
- signature = base::decode<alphabet::base64url>(signature);
-
- auto parse_claims = [](const std::string& str) {
- std::unordered_map<std::string, claim> res;
- picojson::value val;
- if (!picojson::parse(val, str).empty())
- throw std::runtime_error("Invalid json");
-
- for (auto& e : val.get<picojson::object>()) { res.insert({ e.first, claim(e.second) }); }
-
- return res;
- };
-
- header_claims = parse_claims(header);
- payload_claims = parse_claims(payload);
- }
-
- /**
- * Get token string, as passed to constructor
- * \return token as passed to constructor
- */
- const std::string& get_token() const { return token; }
- /**
- * Get header part as json string
- * \return header part after base64 decoding
- */
- const std::string& get_header() const { return header; }
- /**
- * Get payload part as json string
- * \return payload part after base64 decoding
- */
- const std::string& get_payload() const { return payload; }
- /**
- * Get signature part as json string
- * \return signature part after base64 decoding
- */
- const std::string& get_signature() const { return signature; }
- /**
- * Get header part as base64 string
- * \return header part before base64 decoding
- */
- const std::string& get_header_base64() const { return header_base64; }
- /**
- * Get payload part as base64 string
- * \return payload part before base64 decoding
- */
- const std::string& get_payload_base64() const { return payload_base64; }
- /**
- * Get signature part as base64 string
- * \return signature part before base64 decoding
- */
- const std::string& get_signature_base64() const { return signature_base64; }
-
- };
-
- /**
- * Builder class to build and sign a new token
- * Use jwt::create() to get an instance of this class.
- */
- class builder {
- std::unordered_map<std::string, claim> header_claims;
- std::unordered_map<std::string, claim> payload_claims;
-
- builder() {}
- friend builder create();
- public:
- /**
- * Set a header claim.
- * \param id Name of the claim
- * \param c Claim to add
- * \return *this to allow for method chaining
- */
- builder& set_header_claim(const std::string& id, claim c) { header_claims[id] = std::move(c); return *this; }
- /**
- * Set a payload claim.
- * \param id Name of the claim
- * \param c Claim to add
- * \return *this to allow for method chaining
- */
- builder& set_payload_claim(const std::string& id, claim c) { payload_claims[id] = std::move(c); return *this; }
- /**
- * Set algorithm claim
- * You normally don't need to do this, as the algorithm is automatically set if you don't change it.
- * \param str Name of algorithm
- * \return *this to allow for method chaining
- */
- builder& set_algorithm(const std::string& str) { return set_header_claim("alg", claim(str)); }
- /**
- * Set type claim
- * \param str Type to set
- * \return *this to allow for method chaining
- */
- builder& set_type(const std::string& str) { return set_header_claim("typ", claim(str)); }
- /**
- * Set content type claim
- * \param str Type to set
- * \return *this to allow for method chaining
- */
- builder& set_content_type(const std::string& str) { return set_header_claim("cty", claim(str)); }
- /**
- * Set key id claim
- * \param str Key id to set
- * \return *this to allow for method chaining
- */
- builder& set_key_id(const std::string& str) { return set_header_claim("kid", claim(str)); }
- /**
- * Set issuer claim
- * \param str Issuer to set
- * \return *this to allow for method chaining
- */
- builder& set_issuer(const std::string& str) { return set_payload_claim("iss", claim(str)); }
- /**
- * Set subject claim
- * \param str Subject to set
- * \return *this to allow for method chaining
- */
- builder& set_subject(const std::string& str) { return set_payload_claim("sub", claim(str)); }
- /**
- * Set audience claim
- * \param l Audience set
- * \return *this to allow for method chaining
- */
- builder& set_audience(const std::set<std::string>& l) { return set_payload_claim("aud", claim(l)); }
- /**
- * Set audience claim
- * \param aud Single audience
- * \return *this to allow for method chaining
- */
- builder& set_audience(const std::string& aud) { return set_payload_claim("aud", claim(aud)); }
- /**
- * Set expires at claim
- * \param d Expires time
- * \return *this to allow for method chaining
- */
- builder& set_expires_at(const date& d) { return set_payload_claim("exp", claim(d)); }
- /**
- * Set not before claim
- * \param d First valid time
- * \return *this to allow for method chaining
- */
- builder& set_not_before(const date& d) { return set_payload_claim("nbf", claim(d)); }
- /**
- * Set issued at claim
- * \param d Issued at time, should be current time
- * \return *this to allow for method chaining
- */
- builder& set_issued_at(const date& d) { return set_payload_claim("iat", claim(d)); }
- /**
- * Set id claim
- * \param str ID to set
- * \return *this to allow for method chaining
- */
- builder& set_id(const std::string& str) { return set_payload_claim("jti", claim(str)); }
-
- /**
- * Sign token and return result
- * \param algo Instance of an algorithm to sign the token with
- * \return Final token as a string
- */
- template<typename T>
- std::string sign(const T& algo) {
- this->set_algorithm(algo.name());
-
- picojson::object obj_header;
- for (auto& e : header_claims) {
- obj_header.insert({ e.first, e.second.to_json() });
- }
- picojson::object obj_payload;
- for (auto& e : payload_claims) {
- obj_payload.insert({ e.first, e.second.to_json() });
- }
-
- auto encode = [](const std::string& data) {
- auto base = base::encode<alphabet::base64url>(data);
- auto pos = base.find(alphabet::base64url::fill());
- base = base.substr(0, pos);
- return base;
- };
-
- std::string header = encode(picojson::value(obj_header).serialize());
- std::string payload = encode(picojson::value(obj_payload).serialize());
-
- std::string token = header + "." + payload;
-
- return token + "." + encode(algo.sign(token));
- }
- };
-
- /**
- * Verifier class used to check if a decoded token contains all claims required by your application and has a valid signature.
- */
- template<typename Clock>
- class verifier {
- struct algo_base {
- virtual ~algo_base() = default;
- virtual void verify(const std::string& data, const std::string& sig) = 0;
- };
- template<typename T>
- struct algo : public algo_base {
- T alg;
- explicit algo(T a) : alg(a) {}
- virtual void verify(const std::string& data, const std::string& sig) override {
- alg.verify(data, sig);
- }
- };
-
- /// Required claims
- std::unordered_map<std::string, claim> claims;
- /// Leeway time for exp, nbf and iat
- size_t default_leeway = 0;
- /// Instance of clock type
- Clock clock;
- /// Supported algorithms
- std::unordered_map<std::string, std::shared_ptr<algo_base>> algs;
- public:
- /**
- * Constructor for building a new verifier instance
- * \param c Clock instance
- */
- explicit verifier(Clock c) : clock(c) {}
-
- /**
- * Set default leeway to use.
- * \param leeway Default leeway to use if not specified otherwise
- * \return *this to allow chaining
- */
- verifier& leeway(size_t leeway) { default_leeway = leeway; return *this; }
- /**
- * Set leeway for expires at.
- * If not specified the default leeway will be used.
- * \param leeway Set leeway to use for expires at.
- * \return *this to allow chaining
- */
- verifier& expires_at_leeway(size_t leeway) { return with_claim("exp", claim(std::chrono::system_clock::from_time_t(leeway))); }
- /**
- * Set leeway for not before.
- * If not specified the default leeway will be used.
- * \param leeway Set leeway to use for not before.
- * \return *this to allow chaining
- */
- verifier& not_before_leeway(size_t leeway) { return with_claim("nbf", claim(std::chrono::system_clock::from_time_t(leeway))); }
- /**
- * Set leeway for issued at.
- * If not specified the default leeway will be used.
- * \param leeway Set leeway to use for issued at.
- * \return *this to allow chaining
- */
- verifier& issued_at_leeway(size_t leeway) { return with_claim("iat", claim(std::chrono::system_clock::from_time_t(leeway))); }
- /**
- * Set an issuer to check for.
- * Check is casesensitive.
- * \param iss Issuer to check for.
- * \return *this to allow chaining
- */
- verifier& with_issuer(const std::string& iss) { return with_claim("iss", claim(iss)); }
- /**
- * Set a subject to check for.
- * Check is casesensitive.
- * \param sub Subject to check for.
- * \return *this to allow chaining
- */
- verifier& with_subject(const std::string& sub) { return with_claim("sub", claim(sub)); }
- /**
- * Set an audience to check for.
- * If any of the specified audiences is not present in the token the check fails.
- * \param aud Audience to check for.
- * \return *this to allow chaining
- */
- verifier& with_audience(const std::set<std::string>& aud) { return with_claim("aud", claim(aud)); }
- /**
- * Set an id to check for.
- * Check is casesensitive.
- * \param id ID to check for.
- * \return *this to allow chaining
- */
- verifier& with_id(const std::string& id) { return with_claim("jti", claim(id)); }
- /**
- * Specify a claim to check for.
- * \param name Name of the claim to check for
- * \param c Claim to check for
- * \return *this to allow chaining
- */
- verifier& with_claim(const std::string& name, claim c) { claims[name] = c; return *this; }
-
- /**
- * Add an algorithm available for checking.
- * \param alg Algorithm to allow
- * \return *this to allow chaining
- */
- template<typename Algorithm>
- verifier& allow_algorithm(Algorithm alg) {
- algs[alg.name()] = std::make_shared<algo<Algorithm>>(alg);
- return *this;
- }
-
- /**
- * Verify the given token.
- * \param jwt Token to check
- * \throws token_verification_exception Verification failed
- */
- void verify(const decoded_jwt& jwt) const {
- const std::string data = jwt.get_header_base64() + "." + jwt.get_payload_base64();
- const std::string sig = jwt.get_signature();
- const std::string& algo = jwt.get_algorithm();
- if (algs.count(algo) == 0)
- throw token_verification_exception("wrong algorithm");
- algs.at(algo)->verify(data, sig);
-
- auto assert_claim_eq = [](const decoded_jwt& jwt, const std::string& key, const claim& c) {
- if (!jwt.has_payload_claim(key))
- throw token_verification_exception("decoded_jwt is missing " + key + " claim");
- auto& jc = jwt.get_payload_claim(key);
- if (jc.get_type() != c.get_type())
- throw token_verification_exception("claim " + key + " type mismatch");
- if (c.get_type() == claim::type::int64) {
- if (c.as_date() != jc.as_date())
- throw token_verification_exception("claim " + key + " does not match expected");
- }
- else if (c.get_type() == claim::type::array) {
- auto s1 = c.as_set();
- auto s2 = jc.as_set();
- if (s1.size() != s2.size())
- throw token_verification_exception("claim " + key + " does not match expected");
- auto it1 = s1.cbegin();
- auto it2 = s2.cbegin();
- while (it1 != s1.cend() && it2 != s2.cend()) {
- if (*it1++ != *it2++)
- throw token_verification_exception("claim " + key + " does not match expected");
- }
- }
- else if (c.get_type() == claim::type::string) {
- if (c.as_string() != jc.as_string())
- throw token_verification_exception("claim " + key + " does not match expected");
- }
- else throw token_verification_exception("internal error");
- };
-
- auto time = clock.now();
-
- if (jwt.has_expires_at()) {
- auto leeway = claims.count("exp") == 1 ? std::chrono::system_clock::to_time_t(claims.at("exp").as_date()) : default_leeway;
- auto exp = jwt.get_expires_at();
- if (time > exp + std::chrono::seconds(leeway))
- throw token_verification_exception("token expired");
- }
- if (jwt.has_issued_at()) {
- auto leeway = claims.count("iat") == 1 ? std::chrono::system_clock::to_time_t(claims.at("iat").as_date()) : default_leeway;
- auto iat = jwt.get_issued_at();
- if (time < iat - std::chrono::seconds(leeway))
- throw token_verification_exception("token expired");
- }
- if (jwt.has_not_before()) {
- auto leeway = claims.count("nbf") == 1 ? std::chrono::system_clock::to_time_t(claims.at("nbf").as_date()) : default_leeway;
- auto nbf = jwt.get_not_before();
- if (time < nbf - std::chrono::seconds(leeway))
- throw token_verification_exception("token expired");
- }
- for (auto& c : claims)
- {
- if (c.first == "exp" || c.first == "iat" || c.first == "nbf") {
- // Nothing to do here, already checked
- }
- else if (c.first == "aud") {
- if (!jwt.has_audience())
- throw token_verification_exception("token doesn't contain the required audience");
- auto aud = jwt.get_audience();
- auto expected = c.second.as_set();
- for (auto& e : expected)
- if (aud.count(e) == 0)
- throw token_verification_exception("token doesn't contain the required audience");
- }
- else {
- assert_claim_eq(jwt, c.first, c.second);
- }
- }
- }
- };
-
- /**
- * Create a verifier using the given clock
- * \param c Clock instance to use
- * \return verifier instance
- */
- template<typename Clock>
- verifier<Clock> verify(Clock c) {
- return verifier<Clock>(c);
- }
-
- /**
- * Default clock class using std::chrono::system_clock as a backend.
- */
- struct default_clock {
- std::chrono::system_clock::time_point now() const {
- return std::chrono::system_clock::now();
- }
- };
-
- /**
- * Create a verifier using the default clock
- * \return verifier instance
- */
- inline
- verifier<default_clock> verify() {
- return verify<default_clock>({});
- }
-
- /**
- * Return a builder instance to create a new token
- */
- inline
- builder create() {
- return builder();
- }
-
- /**
- * Decode a token
- * \param token Token to decode
- * \return Decoded token
- * \throws std::invalid_argument Token is not in correct format
- * \throws std::runtime_error Base64 decoding failed or invalid json
- */
- inline
- decoded_jwt decode(const std::string& token) {
- return decoded_jwt(token);
- }
-}
+#pragma once
+#define PICOJSON_USE_INT64
+#include "picojson.h"
+#include "base.h"
+#include <set>
+#include <chrono>
+#include <unordered_map>
+#include <memory>
+#include <openssl/evp.h>
+#include <openssl/hmac.h>
+#include <openssl/pem.h>
+#include <openssl/ec.h>
+#include <openssl/err.h>
+
+//If openssl version less than 1.1
+#if OPENSSL_VERSION_NUMBER < 269484032
+#define OPENSSL10
+#endif
+
+#ifndef JWT_CLAIM_EXPLICIT
+#define JWT_CLAIM_EXPLICIT 0
+#endif
+
+namespace jwt {
+ using date = std::chrono::system_clock::time_point;
+
+ struct signature_verification_exception : public std::runtime_error {
+ signature_verification_exception()
+ : std::runtime_error("signature verification failed")
+ {}
+ explicit signature_verification_exception(const std::string& msg)
+ : std::runtime_error(msg)
+ {}
+ explicit signature_verification_exception(const char* msg)
+ : std::runtime_error(msg)
+ {}
+ };
+ struct signature_generation_exception : public std::runtime_error {
+ signature_generation_exception()
+ : std::runtime_error("signature generation failed")
+ {}
+ explicit signature_generation_exception(const std::string& msg)
+ : std::runtime_error(msg)
+ {}
+ explicit signature_generation_exception(const char* msg)
+ : std::runtime_error(msg)
+ {}
+ };
+ struct rsa_exception : public std::runtime_error {
+ explicit rsa_exception(const std::string& msg)
+ : std::runtime_error(msg)
+ {}
+ explicit rsa_exception(const char* msg)
+ : std::runtime_error(msg)
+ {}
+ };
+ struct ecdsa_exception : public std::runtime_error {
+ explicit ecdsa_exception(const std::string& msg)
+ : std::runtime_error(msg)
+ {}
+ explicit ecdsa_exception(const char* msg)
+ : std::runtime_error(msg)
+ {}
+ };
+ struct token_verification_exception : public std::runtime_error {
+ token_verification_exception()
+ : std::runtime_error("token verification failed")
+ {}
+ explicit token_verification_exception(const std::string& msg)
+ : std::runtime_error("token verification failed: " + msg)
+ {}
+ };
+
+ namespace algorithm {
+ /**
+ * "none" algorithm.
+ *
+ * Returns and empty signature and checks if the given signature is empty.
+ */
+ struct none {
+ /// Return an empty string
+ std::string sign(const std::string&) const {
+ return "";
+ }
+ /// Check if the given signature is empty. JWT's with "none" algorithm should not contain a signature.
+ void verify(const std::string&, const std::string& signature) const {
+ if (!signature.empty())
+ throw signature_verification_exception();
+ }
+ /// Get algorithm name
+ std::string name() const {
+ return "none";
+ }
+ };
+ /**
+ * Base class for HMAC family of algorithms
+ */
+ struct hmacsha {
+ /**
+ * Construct new hmac algorithm
+ * \param key Key to use for HMAC
+ * \param md Pointer to hash function
+ * \param name Name of the algorithm
+ */
+ hmacsha(std::string key, const EVP_MD*(*md)(), const std::string& name)
+ : secret(std::move(key)), md(md), alg_name(name)
+ {}
+ /**
+ * Sign jwt data
+ * \param data The data to sign
+ * \return HMAC signature for the given data
+ * \throws signature_generation_exception
+ */
+ std::string sign(const std::string& data) const {
+ std::string res;
+ res.resize(EVP_MAX_MD_SIZE);
+ unsigned int len = res.size();
+ if (HMAC(md(), secret.data(), secret.size(), (const unsigned char*)data.data(), data.size(), (unsigned char*)res.data(), &len) == nullptr)
+ throw signature_generation_exception();
+ res.resize(len);
+ return res;
+ }
+ /**
+ * Check if signature is valid
+ * \param data The data to check signature against
+ * \param signature Signature provided by the jwt
+ * \throws signature_verification_exception If the provided signature does not match
+ */
+ void verify(const std::string& data, const std::string& signature) const {
+ try {
+ auto res = sign(data);
+ bool matched = true;
+ for (size_t i = 0; i < std::min<size_t>(res.size(), signature.size()); i++)
+ if (res[i] != signature[i])
+ matched = false;
+ if (res.size() != signature.size())
+ matched = false;
+ if (!matched)
+ throw signature_verification_exception();
+ }
+ catch (const signature_generation_exception&) {
+ throw signature_verification_exception();
+ }
+ }
+ /**
+ * Returns the algorithm name provided to the constructor
+ * \return Algorithmname
+ */
+ std::string name() const {
+ return alg_name;
+ }
+ private:
+ /// HMAC secrect
+ const std::string secret;
+ /// HMAC hash generator
+ const EVP_MD*(*md)();
+ /// Algorithmname
+ const std::string alg_name;
+ };
+ /**
+ * Base class for RSA family of algorithms
+ */
+ struct rsa {
+ /**
+ * Construct new rsa algorithm
+ * \param public_key RSA public key in PEM format
+ * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
+ * \param public_key_password Password to decrypt public key pem.
+ * \param privat_key_password Password to decrypt private key pem.
+ * \param md Pointer to hash function
+ * \param name Name of the algorithm
+ */
+ rsa(const std::string& public_key, const std::string& private_key, const std::string& public_key_password, const std::string& private_key_password, const EVP_MD*(*md)(), const std::string& name)
+ : md(md), alg_name(name)
+ {
+ std::unique_ptr<BIO, decltype(&BIO_free_all)> pubkey_bio(BIO_new(BIO_s_mem()), BIO_free_all);
+ if ((size_t)BIO_write(pubkey_bio.get(), public_key.data(), public_key.size()) != public_key.size())
+ throw rsa_exception("failed to load public key: bio_write failed");
+ pkey.reset(PEM_read_bio_PUBKEY(pubkey_bio.get(), nullptr, nullptr, (void*)public_key_password.c_str()), EVP_PKEY_free);
+ if (!pkey)
+ throw rsa_exception("failed to load public key: PEM_read_bio_PUBKEY failed");
+
+ if (!private_key.empty()) {
+ std::unique_ptr<BIO, decltype(&BIO_free_all)> privkey_bio(BIO_new(BIO_s_mem()), BIO_free_all);
+ if ((size_t)BIO_write(privkey_bio.get(), private_key.data(), private_key.size()) != private_key.size())
+ throw rsa_exception("failed to load private key: bio_write failed");
+ RSA* privkey = PEM_read_bio_RSAPrivateKey(privkey_bio.get(), nullptr, nullptr, (void*)private_key_password.c_str());
+ if (privkey == nullptr)
+ throw rsa_exception("failed to load private key: PEM_read_bio_RSAPrivateKey failed");
+ if (EVP_PKEY_assign_RSA(pkey.get(), privkey) == 0) {
+ RSA_free(privkey);
+ throw rsa_exception("failed to load private key: EVP_PKEY_assign_RSA failed");
+ }
+ }
+ }
+ /**
+ * Sign jwt data
+ * \param data The data to sign
+ * \return RSA signature for the given data
+ * \throws signature_generation_exception
+ */
+ std::string sign(const std::string& data) const {
+#ifdef OPENSSL10
+ std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_destroy)> ctx(EVP_MD_CTX_create(), EVP_MD_CTX_destroy);
+#else
+ std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_free)> ctx(EVP_MD_CTX_create(), EVP_MD_CTX_free);
+#endif
+ if (!ctx)
+ throw signature_generation_exception("failed to create signature: could not create context");
+ if (!EVP_SignInit(ctx.get(), md()))
+ throw signature_generation_exception("failed to create signature: SignInit failed");
+
+ std::string res;
+ res.resize(EVP_PKEY_size(pkey.get()));
+ unsigned int len = 0;
+
+ if (!EVP_SignUpdate(ctx.get(), data.data(), data.size()))
+ throw signature_generation_exception();
+ if (!EVP_SignFinal(ctx.get(), (unsigned char*)res.data(), &len, pkey.get()))
+ throw signature_generation_exception();
+
+ res.resize(len);
+ return res;
+ }
+ /**
+ * Check if signature is valid
+ * \param data The data to check signature against
+ * \param signature Signature provided by the jwt
+ * \throws signature_verification_exception If the provided signature does not match
+ */
+ void verify(const std::string& data, const std::string& signature) const {
+#ifdef OPENSSL10
+ std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_destroy)> ctx(EVP_MD_CTX_create(), EVP_MD_CTX_destroy);
+#else
+ std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_free)> ctx(EVP_MD_CTX_create(), EVP_MD_CTX_free);
+#endif
+ if (!ctx)
+ throw signature_verification_exception("failed to verify signature: could not create context");
+ if (!EVP_VerifyInit(ctx.get(), md()))
+ throw signature_verification_exception("failed to verify signature: VerifyInit failed");
+ if (!EVP_VerifyUpdate(ctx.get(), data.data(), data.size()))
+ throw signature_verification_exception("failed to verify signature: VerifyUpdate failed");
+ if (!EVP_VerifyFinal(ctx.get(), (const unsigned char*)signature.data(), signature.size(), pkey.get()))
+ throw signature_verification_exception();
+ }
+ /**
+ * Returns the algorithm name provided to the constructor
+ * \return Algorithmname
+ */
+ std::string name() const {
+ return alg_name;
+ }
+ private:
+ /// OpenSSL structure containing converted keys
+ std::shared_ptr<EVP_PKEY> pkey;
+ /// Hash generator
+ const EVP_MD*(*md)();
+ /// Algorithmname
+ const std::string alg_name;
+ };
+ /**
+ * Base class for ECDSA family of algorithms
+ */
+ struct ecdsa {
+ /**
+ * Construct new ecdsa algorithm
+ * \param public_key ECDSA public key in PEM format
+ * \param private_key ECDSA private key or empty string if not available. If empty, signing will always fail.
+ * \param public_key_password Password to decrypt public key pem.
+ * \param privat_key_password Password to decrypt private key pem.
+ * \param md Pointer to hash function
+ * \param name Name of the algorithm
+ */
+ ecdsa(const std::string& public_key, const std::string& private_key, const std::string& public_key_password, const std::string& private_key_password, const EVP_MD*(*md)(), const std::string& name)
+ : md(md), alg_name(name)
+ {
+ if (private_key.empty()) {
+ std::unique_ptr<BIO, decltype(&BIO_free_all)> pubkey_bio(BIO_new(BIO_s_mem()), BIO_free_all);
+ if ((size_t)BIO_write(pubkey_bio.get(), public_key.data(), public_key.size()) != public_key.size())
+ throw ecdsa_exception("failed to load public key: bio_write failed");
+
+ pkey.reset(PEM_read_bio_EC_PUBKEY(pubkey_bio.get(), nullptr, nullptr, (void*)public_key_password.c_str()), EC_KEY_free);
+ if (!pkey)
+ throw ecdsa_exception("failed to load public key: PEM_read_bio_EC_PUBKEY failed");
+ } else {
+ std::unique_ptr<BIO, decltype(&BIO_free_all)> privkey_bio(BIO_new(BIO_s_mem()), BIO_free_all);
+ if ((size_t)BIO_write(privkey_bio.get(), private_key.data(), private_key.size()) != private_key.size())
+ throw ecdsa_exception("failed to load private key: bio_write failed");
+ pkey.reset(PEM_read_bio_ECPrivateKey(privkey_bio.get(), nullptr, nullptr, (void*)private_key_password.c_str()), EC_KEY_free);
+ if (!pkey)
+ throw ecdsa_exception("failed to load private key: PEM_read_bio_RSAPrivateKey failed");
+ }
+
+ if(EC_KEY_check_key(pkey.get()) == 0)
+ throw ecdsa_exception("failed to load key: key is invalid");
+ }
+ /**
+ * Sign jwt data
+ * \param data The data to sign
+ * \return ECDSA signature for the given data
+ * \throws signature_generation_exception
+ */
+ std::string sign(const std::string& data) const {
+ const std::string hash = generate_hash(data);
+
+ std::unique_ptr<ECDSA_SIG, decltype(&ECDSA_SIG_free)>
+ sig(ECDSA_do_sign((const unsigned char*)hash.data(), hash.size(), pkey.get()), ECDSA_SIG_free);
+ if(!sig)
+ throw signature_generation_exception();
+#ifdef OPENSSL10
+
+ return bn2raw(sig->r) + bn2raw(sig->s);
+#else
+ const BIGNUM *r;
+ const BIGNUM *s;
+ ECDSA_SIG_get0(sig.get(), &r, &s);
+ return bn2raw(r) + bn2raw(s);
+#endif
+ }
+ /**
+ * Check if signature is valid
+ * \param data The data to check signature against
+ * \param signature Signature provided by the jwt
+ * \throws signature_verification_exception If the provided signature does not match
+ */
+ void verify(const std::string& data, const std::string& signature) const {
+ const std::string hash = generate_hash(data);
+ auto r = raw2bn(signature.substr(0, signature.size() / 2));
+ auto s = raw2bn(signature.substr(signature.size() / 2));
+
+#ifdef OPENSSL10
+ ECDSA_SIG sig;
+ sig.r = r.get();
+ sig.s = s.get();
+
+ if(ECDSA_do_verify((const unsigned char*)hash.data(), hash.size(), &sig, pkey.get()) != 1)
+ throw signature_verification_exception("Invalid signature");
+#else
+ ECDSA_SIG *sig = ECDSA_SIG_new();
+
+ ECDSA_SIG_set0(sig, r.get(), s.get());
+
+ if(ECDSA_do_verify((const unsigned char*)hash.data(), hash.size(), sig, pkey.get()) != 1)
+ throw signature_verification_exception("Invalid signature");
+#endif
+ }
+ /**
+ * Returns the algorithm name provided to the constructor
+ * \return Algorithmname
+ */
+ std::string name() const {
+ return alg_name;
+ }
+ private:
+ /**
+ * Convert a OpenSSL BIGNUM to a std::string
+ * \param bn BIGNUM to convert
+ * \return bignum as string
+ */
+#ifdef OPENSSL10
+ static std::string bn2raw(BIGNUM* bn)
+#else
+ static std::string bn2raw(const BIGNUM* bn)
+#endif
+ {
+ std::string res;
+ res.resize(BN_num_bytes(bn));
+ BN_bn2bin(bn, (unsigned char*)res.data());
+ if(res.size()%2 == 1 && res[0] == 0x00)
+ return res.substr(1);
+ return res;
+ }
+ /**
+ * Convert an std::string to a OpenSSL BIGNUM
+ * \param raw String to convert
+ * \return BIGNUM representation
+ */
+ static std::unique_ptr<BIGNUM, decltype(&BN_free)> raw2bn(const std::string& raw) {
+ if(static_cast<uint8_t>(raw[0]) >= 0x80) {
+ std::string str(1, 0x00);
+ str += raw;
+ return std::unique_ptr<BIGNUM, decltype(&BN_free)>(BN_bin2bn((const unsigned char*)str.data(), str.size(), nullptr), BN_free);
+ }
+ return std::unique_ptr<BIGNUM, decltype(&BN_free)>(BN_bin2bn((const unsigned char*)raw.data(), raw.size(), nullptr), BN_free);
+ }
+
+ /**
+ * Hash the provided data using the hash function specified in constructor
+ * \param data Data to hash
+ * \return Hash of data
+ */
+ std::string generate_hash(const std::string& data) const {
+#ifdef OPENSSL10
+ std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_destroy)> ctx(EVP_MD_CTX_create(), &EVP_MD_CTX_destroy);
+#else
+ std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_free)> ctx(EVP_MD_CTX_new(), EVP_MD_CTX_free);
+#endif
+ if(EVP_DigestInit(ctx.get(), md()) == 0)
+ throw signature_generation_exception("EVP_DigestInit failed");
+ if(EVP_DigestUpdate(ctx.get(), data.data(), data.size()) == 0)
+ throw signature_generation_exception("EVP_DigestUpdate failed");
+ unsigned int len = 0;
+ std::string res;
+ res.resize(EVP_MD_CTX_size(ctx.get()));
+ if(EVP_DigestFinal(ctx.get(), (unsigned char*)res.data(), &len) == 0)
+ throw signature_generation_exception("EVP_DigestFinal failed");
+ res.resize(len);
+ return res;
+ }
+
+ /// OpenSSL struct containing keys
+ std::shared_ptr<EC_KEY> pkey;
+ /// Hash generator function
+ const EVP_MD*(*md)();
+ /// Algorithmname
+ const std::string alg_name;
+ };
+
+ /**
+ * Base class for PSS-RSA family of algorithms
+ */
+ struct pss {
+ /**
+ * Construct new pss algorithm
+ * \param public_key RSA public key in PEM format
+ * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
+ * \param public_key_password Password to decrypt public key pem.
+ * \param privat_key_password Password to decrypt private key pem.
+ * \param md Pointer to hash function
+ * \param name Name of the algorithm
+ */
+ pss(const std::string& public_key, const std::string& private_key, const std::string& public_key_password, const std::string& private_key_password, const EVP_MD*(*md)(), const std::string& name)
+ : md(md), alg_name(name)
+ {
+ std::unique_ptr<BIO, decltype(&BIO_free_all)> pubkey_bio(BIO_new(BIO_s_mem()), BIO_free_all);
+ if ((size_t)BIO_write(pubkey_bio.get(), public_key.data(), public_key.size()) != public_key.size())
+ throw rsa_exception("failed to load public key: bio_write failed");
+ pkey.reset(PEM_read_bio_PUBKEY(pubkey_bio.get(), nullptr, nullptr, (void*)public_key_password.c_str()), EVP_PKEY_free);
+ if (!pkey)
+ throw rsa_exception("failed to load public key: PEM_read_bio_PUBKEY failed");
+
+ if (!private_key.empty()) {
+ std::unique_ptr<BIO, decltype(&BIO_free_all)> privkey_bio(BIO_new(BIO_s_mem()), BIO_free_all);
+ if ((size_t)BIO_write(privkey_bio.get(), private_key.data(), private_key.size()) != private_key.size())
+ throw rsa_exception("failed to load private key: bio_write failed");
+ RSA* privkey = PEM_read_bio_RSAPrivateKey(privkey_bio.get(), nullptr, nullptr, (void*)private_key_password.c_str());
+ if (privkey == nullptr)
+ throw rsa_exception("failed to load private key: PEM_read_bio_RSAPrivateKey failed");
+ if (EVP_PKEY_assign_RSA(pkey.get(), privkey) == 0) {
+ RSA_free(privkey);
+ throw rsa_exception("failed to load private key: EVP_PKEY_assign_RSA failed");
+ }
+ }
+ }
+ /**
+ * Sign jwt data
+ * \param data The data to sign
+ * \return ECDSA signature for the given data
+ * \throws signature_generation_exception
+ */
+ std::string sign(const std::string& data) const {
+ auto hash = this->generate_hash(data);
+
+ std::unique_ptr<RSA, decltype(&RSA_free)> key(EVP_PKEY_get1_RSA(pkey.get()), RSA_free);
+ const int size = RSA_size(key.get());
+
+ std::string padded(size, 0x00);
+ if (!RSA_padding_add_PKCS1_PSS_mgf1(key.get(), (unsigned char*)padded.data(), (const unsigned char*)hash.data(), md(), md(), -1))
+ throw signature_generation_exception("failed to create signature: RSA_padding_add_PKCS1_PSS_mgf1 failed");
+
+ std::string res(size, 0x00);
+ if (RSA_private_encrypt(size, (const unsigned char*)padded.data(), (unsigned char*)res.data(), key.get(), RSA_NO_PADDING) < 0)
+ throw signature_generation_exception("failed to create signature: RSA_private_encrypt failed");
+ return res;
+ }
+ /**
+ * Check if signature is valid
+ * \param data The data to check signature against
+ * \param signature Signature provided by the jwt
+ * \throws signature_verification_exception If the provided signature does not match
+ */
+ void verify(const std::string& data, const std::string& signature) const {
+ auto hash = this->generate_hash(data);
+
+ std::unique_ptr<RSA, decltype(&RSA_free)> key(EVP_PKEY_get1_RSA(pkey.get()), RSA_free);
+ const int size = RSA_size(key.get());
+
+ std::string sig(size, 0x00);
+ if(!RSA_public_decrypt(signature.size(), (const unsigned char*)signature.data(), (unsigned char*)sig.data(), key.get(), RSA_NO_PADDING))
+ throw signature_verification_exception("Invalid signature");
+
+ if(!RSA_verify_PKCS1_PSS_mgf1(key.get(), (const unsigned char*)hash.data(), md(), md(), (const unsigned char*)sig.data(), -1))
+ throw signature_verification_exception("Invalid signature");
+ }
+ /**
+ * Returns the algorithm name provided to the constructor
+ * \return Algorithmname
+ */
+ std::string name() const {
+ return alg_name;
+ }
+ private:
+ /**
+ * Hash the provided data using the hash function specified in constructor
+ * \param data Data to hash
+ * \return Hash of data
+ */
+ std::string generate_hash(const std::string& data) const {
+#ifdef OPENSSL10
+ std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_destroy)> ctx(EVP_MD_CTX_create(), &EVP_MD_CTX_destroy);
+#else
+ std::unique_ptr<EVP_MD_CTX, decltype(&EVP_MD_CTX_free)> ctx(EVP_MD_CTX_new(), EVP_MD_CTX_free);
+#endif
+ if(EVP_DigestInit(ctx.get(), md()) == 0)
+ throw signature_generation_exception("EVP_DigestInit failed");
+ if(EVP_DigestUpdate(ctx.get(), data.data(), data.size()) == 0)
+ throw signature_generation_exception("EVP_DigestUpdate failed");
+ unsigned int len = 0;
+ std::string res;
+ res.resize(EVP_MD_CTX_size(ctx.get()));
+ if(EVP_DigestFinal(ctx.get(), (unsigned char*)res.data(), &len) == 0)
+ throw signature_generation_exception("EVP_DigestFinal failed");
+ res.resize(len);
+ return res;
+ }
+
+ /// OpenSSL structure containing keys
+ std::shared_ptr<EVP_PKEY> pkey;
+ /// Hash generator function
+ const EVP_MD*(*md)();
+ /// Algorithmname
+ const std::string alg_name;
+ };
+
+ /**
+ * HS256 algorithm
+ */
+ struct hs256 : public hmacsha {
+ /**
+ * Construct new instance of algorithm
+ * \param key HMAC signing key
+ */
+ explicit hs256(std::string key)
+ : hmacsha(std::move(key), EVP_sha256, "HS256")
+ {}
+ };
+ /**
+ * HS384 algorithm
+ */
+ struct hs384 : public hmacsha {
+ /**
+ * Construct new instance of algorithm
+ * \param key HMAC signing key
+ */
+ explicit hs384(std::string key)
+ : hmacsha(std::move(key), EVP_sha384, "HS384")
+ {}
+ };
+ /**
+ * HS512 algorithm
+ */
+ struct hs512 : public hmacsha {
+ /**
+ * Construct new instance of algorithm
+ * \param key HMAC signing key
+ */
+ explicit hs512(std::string key)
+ : hmacsha(std::move(key), EVP_sha512, "HS512")
+ {}
+ };
+ /**
+ * RS256 algorithm
+ */
+ struct rs256 : public rsa {
+ /**
+ * Construct new instance of algorithm
+ * \param public_key RSA public key in PEM format
+ * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
+ * \param public_key_password Password to decrypt public key pem.
+ * \param privat_key_password Password to decrypt private key pem.
+ */
+ rs256(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
+ : rsa(public_key, private_key, public_key_password, private_key_password, EVP_sha256, "RS256")
+ {}
+ };
+ /**
+ * RS384 algorithm
+ */
+ struct rs384 : public rsa {
+ /**
+ * Construct new instance of algorithm
+ * \param public_key RSA public key in PEM format
+ * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
+ * \param public_key_password Password to decrypt public key pem.
+ * \param privat_key_password Password to decrypt private key pem.
+ */
+ rs384(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
+ : rsa(public_key, private_key, public_key_password, private_key_password, EVP_sha384, "RS384")
+ {}
+ };
+ /**
+ * RS512 algorithm
+ */
+ struct rs512 : public rsa {
+ /**
+ * Construct new instance of algorithm
+ * \param public_key RSA public key in PEM format
+ * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
+ * \param public_key_password Password to decrypt public key pem.
+ * \param privat_key_password Password to decrypt private key pem.
+ */
+ rs512(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
+ : rsa(public_key, private_key, public_key_password, private_key_password, EVP_sha512, "RS512")
+ {}
+ };
+ /**
+ * ES256 algorithm
+ */
+ struct es256 : public ecdsa {
+ /**
+ * Construct new instance of algorithm
+ * \param public_key ECDSA public key in PEM format
+ * \param private_key ECDSA private key or empty string if not available. If empty, signing will always fail.
+ * \param public_key_password Password to decrypt public key pem.
+ * \param privat_key_password Password to decrypt private key pem.
+ */
+ es256(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
+ : ecdsa(public_key, private_key, public_key_password, private_key_password, EVP_sha256, "ES256")
+ {}
+ };
+ /**
+ * ES384 algorithm
+ */
+ struct es384 : public ecdsa {
+ /**
+ * Construct new instance of algorithm
+ * \param public_key ECDSA public key in PEM format
+ * \param private_key ECDSA private key or empty string if not available. If empty, signing will always fail.
+ * \param public_key_password Password to decrypt public key pem.
+ * \param privat_key_password Password to decrypt private key pem.
+ */
+ es384(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
+ : ecdsa(public_key, private_key, public_key_password, private_key_password, EVP_sha384, "ES384")
+ {}
+ };
+ /**
+ * ES512 algorithm
+ */
+ struct es512 : public ecdsa {
+ /**
+ * Construct new instance of algorithm
+ * \param public_key ECDSA public key in PEM format
+ * \param private_key ECDSA private key or empty string if not available. If empty, signing will always fail.
+ * \param public_key_password Password to decrypt public key pem.
+ * \param privat_key_password Password to decrypt private key pem.
+ */
+ es512(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
+ : ecdsa(public_key, private_key, public_key_password, private_key_password, EVP_sha512, "ES512")
+ {}
+ };
+
+ /**
+ * PS256 algorithm
+ */
+ struct ps256 : public pss {
+ /**
+ * Construct new instance of algorithm
+ * \param public_key RSA public key in PEM format
+ * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
+ * \param public_key_password Password to decrypt public key pem.
+ * \param privat_key_password Password to decrypt private key pem.
+ */
+ ps256(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
+ : pss(public_key, private_key, public_key_password, private_key_password, EVP_sha256, "PS256")
+ {}
+ };
+ /**
+ * PS384 algorithm
+ */
+ struct ps384 : public pss {
+ /**
+ * Construct new instance of algorithm
+ * \param public_key RSA public key in PEM format
+ * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
+ * \param public_key_password Password to decrypt public key pem.
+ * \param privat_key_password Password to decrypt private key pem.
+ */
+ ps384(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
+ : pss(public_key, private_key, public_key_password, private_key_password, EVP_sha384, "PS384")
+ {}
+ };
+ /**
+ * PS512 algorithm
+ */
+ struct ps512 : public pss {
+ /**
+ * Construct new instance of algorithm
+ * \param public_key RSA public key in PEM format
+ * \param private_key RSA private key or empty string if not available. If empty, signing will always fail.
+ * \param public_key_password Password to decrypt public key pem.
+ * \param privat_key_password Password to decrypt private key pem.
+ */
+ ps512(const std::string& public_key, const std::string& private_key = "", const std::string& public_key_password = "", const std::string& private_key_password = "")
+ : pss(public_key, private_key, public_key_password, private_key_password, EVP_sha512, "PS512")
+ {}
+ };
+ }
+
+ /**
+ * Convenience wrapper for JSON value
+ */
+ class claim {
+ picojson::value val;
+ public:
+ enum class type {
+ null,
+ boolean,
+ number,
+ string,
+ array,
+ object,
+ int64
+ };
+
+ claim()
+ : val()
+ {}
+#if JWT_CLAIM_EXPLICIT
+ explicit claim(std::string s)
+ : val(std::move(s))
+ {}
+ explicit claim(const date& s)
+ : val(int64_t(std::chrono::system_clock::to_time_t(s)))
+ {}
+ explicit claim(const std::set<std::string>& s)
+ : val(picojson::array(s.cbegin(), s.cend()))
+ {}
+ explicit claim(const picojson::value& val)
+ : val(val)
+ {}
+#else
+ claim(std::string s)
+ : val(std::move(s))
+ {}
+ claim(const date& s)
+ : val(int64_t(std::chrono::system_clock::to_time_t(s)))
+ {}
+ claim(const std::set<std::string>& s)
+ : val(picojson::array(s.cbegin(), s.cend()))
+ {}
+ claim(const picojson::value& val)
+ : val(val)
+ {}
+#endif
+
+ /**
+ * Get wrapped json object
+ * \return Wrapped json object
+ */
+ picojson::value to_json() const {
+ return val;
+ }
+
+ /**
+ * Get type of contained object
+ * \return Type
+ * \throws std::logic_error An internal error occured
+ */
+ type get_type() const {
+ if (val.is<picojson::null>()) return type::null;
+ else if (val.is<bool>()) return type::boolean;
+ else if (val.is<int64_t>()) return type::int64;
+ else if (val.is<double>()) return type::number;
+ else if (val.is<std::string>()) return type::string;
+ else if (val.is<picojson::array>()) return type::array;
+ else if (val.is<picojson::object>()) return type::object;
+ else throw std::logic_error("internal error");
+ }
+
+ /**
+ * Get the contained object as a string
+ * \return content as string
+ * \throws std::bad_cast Content was not a string
+ */
+ const std::string& as_string() const {
+ if (!val.is<std::string>())
+ throw std::bad_cast();
+ return val.get<std::string>();
+ }
+ /**
+ * Get the contained object as a date
+ * \return content as date
+ * \throws std::bad_cast Content was not a date
+ */
+ date as_date() const {
+ return std::chrono::system_clock::from_time_t(as_int());
+ }
+ /**
+ * Get the contained object as an array
+ * \return content as array
+ * \throws std::bad_cast Content was not an array
+ */
+ const picojson::array& as_array() const {
+ if (!val.is<picojson::array>())
+ throw std::bad_cast();
+ return val.get<picojson::array>();
+ }
+ /**
+ * Get the contained object as a set of strings
+ * \return content as set of strings
+ * \throws std::bad_cast Content was not a set
+ */
+ const std::set<std::string> as_set() const {
+ std::set<std::string> res;
+ for(auto& e : as_array()) {
+ if(!e.is<std::string>())
+ throw std::bad_cast();
+ res.insert(e.get<std::string>());
+ }
+ return res;
+ }
+ /**
+ * Get the contained object as an integer
+ * \return content as int
+ * \throws std::bad_cast Content was not an int
+ */
+ int64_t as_int() const {
+ if (!val.is<int64_t>())
+ throw std::bad_cast();
+ return val.get<int64_t>();
+ }
+ /**
+ * Get the contained object as a bool
+ * \return content as bool
+ * \throws std::bad_cast Content was not a bool
+ */
+ bool as_bool() const {
+ if (!val.is<bool>())
+ throw std::bad_cast();
+ return val.get<bool>();
+ }
+ /**
+ * Get the contained object as a number
+ * \return content as double
+ * \throws std::bad_cast Content was not a number
+ */
+ double as_number() const {
+ if (!val.is<double>())
+ throw std::bad_cast();
+ return val.get<double>();
+ }
+ };
+
+ /**
+ * Base class that represents a token payload.
+ * Contains Convenience accessors for common claims.
+ */
+ class payload {
+ protected:
+ std::unordered_map<std::string, claim> payload_claims;
+ public:
+ /**
+ * Check if issuer is present ("iss")
+ * \return true if present, false otherwise
+ */
+ bool has_issuer() const noexcept { return has_payload_claim("iss"); }
+ /**
+ * Check if subject is present ("sub")
+ * \return true if present, false otherwise
+ */
+ bool has_subject() const noexcept { return has_payload_claim("sub"); }
+ /**
+ * Check if audience is present ("aud")
+ * \return true if present, false otherwise
+ */
+ bool has_audience() const noexcept { return has_payload_claim("aud"); }
+ /**
+ * Check if expires is present ("exp")
+ * \return true if present, false otherwise
+ */
+ bool has_expires_at() const noexcept { return has_payload_claim("exp"); }
+ /**
+ * Check if not before is present ("nbf")
+ * \return true if present, false otherwise
+ */
+ bool has_not_before() const noexcept { return has_payload_claim("nbf"); }
+ /**
+ * Check if issued at is present ("iat")
+ * \return true if present, false otherwise
+ */
+ bool has_issued_at() const noexcept { return has_payload_claim("iat"); }
+ /**
+ * Check if token id is present ("jti")
+ * \return true if present, false otherwise
+ */
+ bool has_id() const noexcept { return has_payload_claim("jti"); }
+ /**
+ * Get issuer claim
+ * \return issuer as string
+ * \throws std::runtime_error If claim was not present
+ * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
+ */
+ const std::string& get_issuer() const { return get_payload_claim("iss").as_string(); }
+ /**
+ * Get subject claim
+ * \return subject as string
+ * \throws std::runtime_error If claim was not present
+ * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
+ */
+ const std::string& get_subject() const { return get_payload_claim("sub").as_string(); }
+ /**
+ * Get audience claim
+ * \return audience as a set of strings
+ * \throws std::runtime_error If claim was not present
+ * \throws std::bad_cast Claim was present but not a set (Should not happen in a valid token)
+ */
+ std::set<std::string> get_audience() const {
+ auto aud = get_payload_claim("aud");
+ if(aud.get_type() == jwt::claim::type::string) return { aud.as_string()};
+ else return aud.as_set();
+ }
+ /**
+ * Get expires claim
+ * \return expires as a date in utc
+ * \throws std::runtime_error If claim was not present
+ * \throws std::bad_cast Claim was present but not a date (Should not happen in a valid token)
+ */
+ const date get_expires_at() const { return get_payload_claim("exp").as_date(); }
+ /**
+ * Get not valid before claim
+ * \return nbf date in utc
+ * \throws std::runtime_error If claim was not present
+ * \throws std::bad_cast Claim was present but not a date (Should not happen in a valid token)
+ */
+ const date get_not_before() const { return get_payload_claim("nbf").as_date(); }
+ /**
+ * Get issued at claim
+ * \return issued at as date in utc
+ * \throws std::runtime_error If claim was not present
+ * \throws std::bad_cast Claim was present but not a date (Should not happen in a valid token)
+ */
+ const date get_issued_at() const { return get_payload_claim("iat").as_date(); }
+ /**
+ * Get id claim
+ * \return id as string
+ * \throws std::runtime_error If claim was not present
+ * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
+ */
+ const std::string& get_id() const { return get_payload_claim("jti").as_string(); }
+ /**
+ * Check if a payload claim is present
+ * \return true if claim was present, false otherwise
+ */
+ bool has_payload_claim(const std::string& name) const noexcept { return payload_claims.count(name) != 0; }
+ /**
+ * Get payload claim
+ * \return Requested claim
+ * \throws std::runtime_error If claim was not present
+ */
+ const claim& get_payload_claim(const std::string& name) const {
+ if (!has_payload_claim(name))
+ throw std::runtime_error("claim not found");
+ return payload_claims.at(name);
+ }
+ /**
+ * Get all payload claims
+ * \return map of claims
+ */
+ std::unordered_map<std::string, claim> get_payload_claims() const { return payload_claims; }
+ };
+
+ /**
+ * Base class that represents a token header.
+ * Contains Convenience accessors for common claims.
+ */
+ class header {
+ protected:
+ std::unordered_map<std::string, claim> header_claims;
+ public:
+ /**
+ * Check if algortihm is present ("alg")
+ * \return true if present, false otherwise
+ */
+ bool has_algorithm() const noexcept { return has_header_claim("alg"); }
+ /**
+ * Check if type is present ("typ")
+ * \return true if present, false otherwise
+ */
+ bool has_type() const noexcept { return has_header_claim("typ"); }
+ /**
+ * Check if content type is present ("cty")
+ * \return true if present, false otherwise
+ */
+ bool has_content_type() const noexcept { return has_header_claim("cty"); }
+ /**
+ * Check if key id is present ("kid")
+ * \return true if present, false otherwise
+ */
+ bool has_key_id() const noexcept { return has_header_claim("kid"); }
+ /**
+ * Get algorithm claim
+ * \return algorithm as string
+ * \throws std::runtime_error If claim was not present
+ * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
+ */
+ const std::string& get_algorithm() const { return get_header_claim("alg").as_string(); }
+ /**
+ * Get type claim
+ * \return type as a string
+ * \throws std::runtime_error If claim was not present
+ * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
+ */
+ const std::string& get_type() const { return get_header_claim("typ").as_string(); }
+ /**
+ * Get content type claim
+ * \return content type as string
+ * \throws std::runtime_error If claim was not present
+ * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
+ */
+ const std::string& get_content_type() const { return get_header_claim("cty").as_string(); }
+ /**
+ * Get key id claim
+ * \return key id as string
+ * \throws std::runtime_error If claim was not present
+ * \throws std::bad_cast Claim was present but not a string (Should not happen in a valid token)
+ */
+ const std::string& get_key_id() const { return get_header_claim("kid").as_string(); }
+ /**
+ * Check if a header claim is present
+ * \return true if claim was present, false otherwise
+ */
+ bool has_header_claim(const std::string& name) const noexcept { return header_claims.count(name) != 0; }
+ /**
+ * Get header claim
+ * \return Requested claim
+ * \throws std::runtime_error If claim was not present
+ */
+ const claim& get_header_claim(const std::string& name) const {
+ if (!has_header_claim(name))
+ throw std::runtime_error("claim not found");
+ return header_claims.at(name);
+ }
+ /**
+ * Get all header claims
+ * \return map of claims
+ */
+ std::unordered_map<std::string, claim> get_header_claims() const { return header_claims; }
+ };
+
+ /**
+ * Class containing all information about a decoded token
+ */
+ class decoded_jwt : public header, public payload {
+ protected:
+ /// Unmodifed token, as passed to constructor
+ const std::string token;
+ /// Header part decoded from base64
+ std::string header;
+ /// Unmodified header part in base64
+ std::string header_base64;
+ /// Payload part decoded from base64
+ std::string payload;
+ /// Unmodified payload part in base64
+ std::string payload_base64;
+ /// Signature part decoded from base64
+ std::string signature;
+ /// Unmodified signature part in base64
+ std::string signature_base64;
+ public:
+ /**
+ * Constructor
+ * Parses a given token
+ * \param token The token to parse
+ * \throws std::invalid_argument Token is not in correct format
+ * \throws std::runtime_error Base64 decoding failed or invalid json
+ */
+ explicit decoded_jwt(const std::string& token)
+ : token(token)
+ {
+ auto hdr_end = token.find('.');
+ if (hdr_end == std::string::npos)
+ throw std::invalid_argument("invalid token supplied");
+ auto payload_end = token.find('.', hdr_end + 1);
+ if (payload_end == std::string::npos)
+ throw std::invalid_argument("invalid token supplied");
+ header = header_base64 = token.substr(0, hdr_end);
+ payload = payload_base64 = token.substr(hdr_end + 1, payload_end - hdr_end - 1);
+ signature = signature_base64 = token.substr(payload_end + 1);
+
+ // Fix padding: JWT requires padding to get removed
+ auto fix_padding = [](std::string& str) {
+ switch (str.size() % 4) {
+ case 1:
+ str += alphabet::base64url::fill();
+#ifdef __cpp_attributes
+#if __has_cpp_attribute(fallthrough)
+ [[fallthrough]];
+#endif
+#endif
+ case 2:
+ str += alphabet::base64url::fill();
+#ifdef __cpp_attributes
+#if __has_cpp_attribute(fallthrough)
+ [[fallthrough]];
+#endif
+#endif
+ case 3:
+ str += alphabet::base64url::fill();
+#ifdef __cpp_attributes
+#if __has_cpp_attribute(fallthrough)
+ [[fallthrough]];
+#endif
+#endif
+ default:
+ break;
+ }
+ };
+ fix_padding(header);
+ fix_padding(payload);
+ fix_padding(signature);
+
+ header = base::decode<alphabet::base64url>(header);
+ payload = base::decode<alphabet::base64url>(payload);
+ signature = base::decode<alphabet::base64url>(signature);
+
+ auto parse_claims = [](const std::string& str) {
+ std::unordered_map<std::string, claim> res;
+ picojson::value val;
+ if (!picojson::parse(val, str).empty())
+ throw std::runtime_error("Invalid json");
+
+ for (auto& e : val.get<picojson::object>()) { res.insert({ e.first, claim(e.second) }); }
+
+ return res;
+ };
+
+ header_claims = parse_claims(header);
+ payload_claims = parse_claims(payload);
+ }
+
+ /**
+ * Get token string, as passed to constructor
+ * \return token as passed to constructor
+ */
+ const std::string& get_token() const { return token; }
+ /**
+ * Get header part as json string
+ * \return header part after base64 decoding
+ */
+ const std::string& get_header() const { return header; }
+ /**
+ * Get payload part as json string
+ * \return payload part after base64 decoding
+ */
+ const std::string& get_payload() const { return payload; }
+ /**
+ * Get signature part as json string
+ * \return signature part after base64 decoding
+ */
+ const std::string& get_signature() const { return signature; }
+ /**
+ * Get header part as base64 string
+ * \return header part before base64 decoding
+ */
+ const std::string& get_header_base64() const { return header_base64; }
+ /**
+ * Get payload part as base64 string
+ * \return payload part before base64 decoding
+ */
+ const std::string& get_payload_base64() const { return payload_base64; }
+ /**
+ * Get signature part as base64 string
+ * \return signature part before base64 decoding
+ */
+ const std::string& get_signature_base64() const { return signature_base64; }
+
+ };
+
+ /**
+ * Builder class to build and sign a new token
+ * Use jwt::create() to get an instance of this class.
+ */
+ class builder {
+ std::unordered_map<std::string, claim> header_claims;
+ std::unordered_map<std::string, claim> payload_claims;
+
+ builder() {}
+ friend builder create();
+ public:
+ /**
+ * Set a header claim.
+ * \param id Name of the claim
+ * \param c Claim to add
+ * \return *this to allow for method chaining
+ */
+ builder& set_header_claim(const std::string& id, claim c) { header_claims[id] = std::move(c); return *this; }
+ /**
+ * Set a payload claim.
+ * \param id Name of the claim
+ * \param c Claim to add
+ * \return *this to allow for method chaining
+ */
+ builder& set_payload_claim(const std::string& id, claim c) { payload_claims[id] = std::move(c); return *this; }
+ /**
+ * Set algorithm claim
+ * You normally don't need to do this, as the algorithm is automatically set if you don't change it.
+ * \param str Name of algorithm
+ * \return *this to allow for method chaining
+ */
+ builder& set_algorithm(const std::string& str) { return set_header_claim("alg", claim(str)); }
+ /**
+ * Set type claim
+ * \param str Type to set
+ * \return *this to allow for method chaining
+ */
+ builder& set_type(const std::string& str) { return set_header_claim("typ", claim(str)); }
+ /**
+ * Set content type claim
+ * \param str Type to set
+ * \return *this to allow for method chaining
+ */
+ builder& set_content_type(const std::string& str) { return set_header_claim("cty", claim(str)); }
+ /**
+ * Set key id claim
+ * \param str Key id to set
+ * \return *this to allow for method chaining
+ */
+ builder& set_key_id(const std::string& str) { return set_header_claim("kid", claim(str)); }
+ /**
+ * Set issuer claim
+ * \param str Issuer to set
+ * \return *this to allow for method chaining
+ */
+ builder& set_issuer(const std::string& str) { return set_payload_claim("iss", claim(str)); }
+ /**
+ * Set subject claim
+ * \param str Subject to set
+ * \return *this to allow for method chaining
+ */
+ builder& set_subject(const std::string& str) { return set_payload_claim("sub", claim(str)); }
+ /**
+ * Set audience claim
+ * \param l Audience set
+ * \return *this to allow for method chaining
+ */
+ builder& set_audience(const std::set<std::string>& l) { return set_payload_claim("aud", claim(l)); }
+ /**
+ * Set audience claim
+ * \param aud Single audience
+ * \return *this to allow for method chaining
+ */
+ builder& set_audience(const std::string& aud) { return set_payload_claim("aud", claim(aud)); }
+ /**
+ * Set expires at claim
+ * \param d Expires time
+ * \return *this to allow for method chaining
+ */
+ builder& set_expires_at(const date& d) { return set_payload_claim("exp", claim(d)); }
+ /**
+ * Set not before claim
+ * \param d First valid time
+ * \return *this to allow for method chaining
+ */
+ builder& set_not_before(const date& d) { return set_payload_claim("nbf", claim(d)); }
+ /**
+ * Set issued at claim
+ * \param d Issued at time, should be current time
+ * \return *this to allow for method chaining
+ */
+ builder& set_issued_at(const date& d) { return set_payload_claim("iat", claim(d)); }
+ /**
+ * Set id claim
+ * \param str ID to set
+ * \return *this to allow for method chaining
+ */
+ builder& set_id(const std::string& str) { return set_payload_claim("jti", claim(str)); }
+
+ /**
+ * Sign token and return result
+ * \param algo Instance of an algorithm to sign the token with
+ * \return Final token as a string
+ */
+ template<typename T>
+ std::string sign(const T& algo) {
+ this->set_algorithm(algo.name());
+
+ picojson::object obj_header;
+ for (auto& e : header_claims) {
+ obj_header.insert({ e.first, e.second.to_json() });
+ }
+ picojson::object obj_payload;
+ for (auto& e : payload_claims) {
+ obj_payload.insert({ e.first, e.second.to_json() });
+ }
+
+ auto encode = [](const std::string& data) {
+ auto base = base::encode<alphabet::base64url>(data);
+ auto pos = base.find(alphabet::base64url::fill());
+ base = base.substr(0, pos);
+ return base;
+ };
+
+ std::string header = encode(picojson::value(obj_header).serialize());
+ std::string payload = encode(picojson::value(obj_payload).serialize());
+
+ std::string token = header + "." + payload;
+
+ return token + "." + encode(algo.sign(token));
+ }
+ };
+
+ /**
+ * Verifier class used to check if a decoded token contains all claims required by your application and has a valid signature.
+ */
+ template<typename Clock>
+ class verifier {
+ struct algo_base {
+ virtual ~algo_base() = default;
+ virtual void verify(const std::string& data, const std::string& sig) = 0;
+ };
+ template<typename T>
+ struct algo : public algo_base {
+ T alg;
+ explicit algo(T a) : alg(a) {}
+ virtual void verify(const std::string& data, const std::string& sig) override {
+ alg.verify(data, sig);
+ }
+ };
+
+ /// Required claims
+ std::unordered_map<std::string, claim> claims;
+ /// Leeway time for exp, nbf and iat
+ size_t default_leeway = 0;
+ /// Instance of clock type
+ Clock clock;
+ /// Supported algorithms
+ std::unordered_map<std::string, std::shared_ptr<algo_base>> algs;
+ public:
+ /**
+ * Constructor for building a new verifier instance
+ * \param c Clock instance
+ */
+ explicit verifier(Clock c) : clock(c) {}
+
+ /**
+ * Set default leeway to use.
+ * \param leeway Default leeway to use if not specified otherwise
+ * \return *this to allow chaining
+ */
+ verifier& leeway(size_t leeway) { default_leeway = leeway; return *this; }
+ /**
+ * Set leeway for expires at.
+ * If not specified the default leeway will be used.
+ * \param leeway Set leeway to use for expires at.
+ * \return *this to allow chaining
+ */
+ verifier& expires_at_leeway(size_t leeway) { return with_claim("exp", claim(std::chrono::system_clock::from_time_t(leeway))); }
+ /**
+ * Set leeway for not before.
+ * If not specified the default leeway will be used.
+ * \param leeway Set leeway to use for not before.
+ * \return *this to allow chaining
+ */
+ verifier& not_before_leeway(size_t leeway) { return with_claim("nbf", claim(std::chrono::system_clock::from_time_t(leeway))); }
+ /**
+ * Set leeway for issued at.
+ * If not specified the default leeway will be used.
+ * \param leeway Set leeway to use for issued at.
+ * \return *this to allow chaining
+ */
+ verifier& issued_at_leeway(size_t leeway) { return with_claim("iat", claim(std::chrono::system_clock::from_time_t(leeway))); }
+ /**
+ * Set an issuer to check for.
+ * Check is casesensitive.
+ * \param iss Issuer to check for.
+ * \return *this to allow chaining
+ */
+ verifier& with_issuer(const std::string& iss) { return with_claim("iss", claim(iss)); }
+ /**
+ * Set a subject to check for.
+ * Check is casesensitive.
+ * \param sub Subject to check for.
+ * \return *this to allow chaining
+ */
+ verifier& with_subject(const std::string& sub) { return with_claim("sub", claim(sub)); }
+ /**
+ * Set an audience to check for.
+ * If any of the specified audiences is not present in the token the check fails.
+ * \param aud Audience to check for.
+ * \return *this to allow chaining
+ */
+ verifier& with_audience(const std::set<std::string>& aud) { return with_claim("aud", claim(aud)); }
+ /**
+ * Set an id to check for.
+ * Check is casesensitive.
+ * \param id ID to check for.
+ * \return *this to allow chaining
+ */
+ verifier& with_id(const std::string& id) { return with_claim("jti", claim(id)); }
+ /**
+ * Specify a claim to check for.
+ * \param name Name of the claim to check for
+ * \param c Claim to check for
+ * \return *this to allow chaining
+ */
+ verifier& with_claim(const std::string& name, claim c) { claims[name] = c; return *this; }
+
+ /**
+ * Add an algorithm available for checking.
+ * \param alg Algorithm to allow
+ * \return *this to allow chaining
+ */
+ template<typename Algorithm>
+ verifier& allow_algorithm(Algorithm alg) {
+ algs[alg.name()] = std::make_shared<algo<Algorithm>>(alg);
+ return *this;
+ }
+
+ /**
+ * Verify the given token.
+ * \param jwt Token to check
+ * \throws token_verification_exception Verification failed
+ */
+ void verify(const decoded_jwt& jwt) const {
+ const std::string data = jwt.get_header_base64() + "." + jwt.get_payload_base64();
+ const std::string sig = jwt.get_signature();
+ const std::string& algo = jwt.get_algorithm();
+ if (algs.count(algo) == 0)
+ throw token_verification_exception("wrong algorithm");
+ algs.at(algo)->verify(data, sig);
+
+ auto assert_claim_eq = [](const decoded_jwt& jwt, const std::string& key, const claim& c) {
+ if (!jwt.has_payload_claim(key))
+ throw token_verification_exception("decoded_jwt is missing " + key + " claim");
+ auto& jc = jwt.get_payload_claim(key);
+ if (jc.get_type() != c.get_type())
+ throw token_verification_exception("claim " + key + " type mismatch");
+ if (c.get_type() == claim::type::int64) {
+ if (c.as_date() != jc.as_date())
+ throw token_verification_exception("claim " + key + " does not match expected");
+ }
+ else if (c.get_type() == claim::type::array) {
+ auto s1 = c.as_set();
+ auto s2 = jc.as_set();
+ if (s1.size() != s2.size())
+ throw token_verification_exception("claim " + key + " does not match expected");
+ auto it1 = s1.cbegin();
+ auto it2 = s2.cbegin();
+ while (it1 != s1.cend() && it2 != s2.cend()) {
+ if (*it1++ != *it2++)
+ throw token_verification_exception("claim " + key + " does not match expected");
+ }
+ }
+ else if (c.get_type() == claim::type::string) {
+ if (c.as_string() != jc.as_string())
+ throw token_verification_exception("claim " + key + " does not match expected");
+ }
+ else throw token_verification_exception("internal error");
+ };
+
+ auto time = clock.now();
+
+ if (jwt.has_expires_at()) {
+ auto leeway = claims.count("exp") == 1 ? std::chrono::system_clock::to_time_t(claims.at("exp").as_date()) : default_leeway;
+ auto exp = jwt.get_expires_at();
+ if (time > exp + std::chrono::seconds(leeway))
+ throw token_verification_exception("token expired");
+ }
+ if (jwt.has_issued_at()) {
+ auto leeway = claims.count("iat") == 1 ? std::chrono::system_clock::to_time_t(claims.at("iat").as_date()) : default_leeway;
+ auto iat = jwt.get_issued_at();
+ if (time < iat - std::chrono::seconds(leeway))
+ throw token_verification_exception("token expired");
+ }
+ if (jwt.has_not_before()) {
+ auto leeway = claims.count("nbf") == 1 ? std::chrono::system_clock::to_time_t(claims.at("nbf").as_date()) : default_leeway;
+ auto nbf = jwt.get_not_before();
+ if (time < nbf - std::chrono::seconds(leeway))
+ throw token_verification_exception("token expired");
+ }
+ for (auto& c : claims)
+ {
+ if (c.first == "exp" || c.first == "iat" || c.first == "nbf") {
+ // Nothing to do here, already checked
+ }
+ else if (c.first == "aud") {
+ if (!jwt.has_audience())
+ throw token_verification_exception("token doesn't contain the required audience");
+ auto aud = jwt.get_audience();
+ auto expected = c.second.as_set();
+ for (auto& e : expected)
+ if (aud.count(e) == 0)
+ throw token_verification_exception("token doesn't contain the required audience");
+ }
+ else {
+ assert_claim_eq(jwt, c.first, c.second);
+ }
+ }
+ }
+ };
+
+ /**
+ * Create a verifier using the given clock
+ * \param c Clock instance to use
+ * \return verifier instance
+ */
+ template<typename Clock>
+ verifier<Clock> verify(Clock c) {
+ return verifier<Clock>(c);
+ }
+
+ /**
+ * Default clock class using std::chrono::system_clock as a backend.
+ */
+ struct default_clock {
+ std::chrono::system_clock::time_point now() const {
+ return std::chrono::system_clock::now();
+ }
+ };
+
+ /**
+ * Create a verifier using the default clock
+ * \return verifier instance
+ */
+ inline
+ verifier<default_clock> verify() {
+ return verify<default_clock>({});
+ }
+
+ /**
+ * Return a builder instance to create a new token
+ */
+ inline
+ builder create() {
+ return builder();
+ }
+
+ /**
+ * Decode a token
+ * \param token Token to decode
+ * \return Decoded token
+ * \throws std::invalid_argument Token is not in correct format
+ * \throws std::runtime_error Base64 decoding failed or invalid json
+ */
+ inline
+ decoded_jwt decode(const std::string& token) {
+ return decoded_jwt(token);
+ }
+}
diff --git a/contrib/libs/jwt-cpp/picojson.h b/contrib/libs/jwt-cpp/picojson.h
index c2321e9728..b2710c85bc 100644
--- a/contrib/libs/jwt-cpp/picojson.h
+++ b/contrib/libs/jwt-cpp/picojson.h
@@ -1,1172 +1,1172 @@
-/*
- * Copyright 2009-2010 Cybozu Labs, Inc.
- * Copyright 2011-2014 Kazuho Oku
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions are met:
- *
- * 1. Redistributions of source code must retain the above copyright notice,
- * this list of conditions and the following disclaimer.
- *
- * 2. Redistributions in binary form must reproduce the above copyright notice,
- * this list of conditions and the following disclaimer in the documentation
- * and/or other materials provided with the distribution.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
- * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
- * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
- * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
- * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
- * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
- * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
- * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
- * POSSIBILITY OF SUCH DAMAGE.
- */
-#ifndef picojson_h
-#define picojson_h
-
-#include <algorithm>
-#include <cstdio>
-#include <cstdlib>
-#include <cstring>
-#include <cstddef>
-#include <iostream>
-#include <iterator>
-#include <limits>
-#include <map>
-#include <stdexcept>
-#include <string>
-#include <vector>
-#include <utility>
-
-// for isnan/isinf
-#if __cplusplus >= 201103L
-#include <cmath>
-#else
-extern "C" {
-#ifdef _MSC_VER
-#include <float.h>
-#elif defined(__INTEL_COMPILER)
-#include <mathimf.h>
-#else
-#include <math.h>
-#endif
-}
-#endif
-
-#ifndef PICOJSON_USE_RVALUE_REFERENCE
-#if (defined(__cpp_rvalue_references) && __cpp_rvalue_references >= 200610) || (defined(_MSC_VER) && _MSC_VER >= 1600)
-#define PICOJSON_USE_RVALUE_REFERENCE 1
-#else
-#define PICOJSON_USE_RVALUE_REFERENCE 0
-#endif
-#endif // PICOJSON_USE_RVALUE_REFERENCE
-
-#ifndef PICOJSON_NOEXCEPT
-#if PICOJSON_USE_RVALUE_REFERENCE
-#define PICOJSON_NOEXCEPT noexcept
-#else
-#define PICOJSON_NOEXCEPT throw()
-#endif
-#endif
-
-// experimental support for int64_t (see README.mkdn for detail)
-#ifdef PICOJSON_USE_INT64
+/*
+ * Copyright 2009-2010 Cybozu Labs, Inc.
+ * Copyright 2011-2014 Kazuho Oku
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
+#ifndef picojson_h
+#define picojson_h
+
+#include <algorithm>
+#include <cstdio>
+#include <cstdlib>
+#include <cstring>
+#include <cstddef>
+#include <iostream>
+#include <iterator>
+#include <limits>
+#include <map>
+#include <stdexcept>
+#include <string>
+#include <vector>
+#include <utility>
+
+// for isnan/isinf
+#if __cplusplus >= 201103L
+#include <cmath>
+#else
+extern "C" {
+#ifdef _MSC_VER
+#include <float.h>
+#elif defined(__INTEL_COMPILER)
+#include <mathimf.h>
+#else
+#include <math.h>
+#endif
+}
+#endif
+
+#ifndef PICOJSON_USE_RVALUE_REFERENCE
+#if (defined(__cpp_rvalue_references) && __cpp_rvalue_references >= 200610) || (defined(_MSC_VER) && _MSC_VER >= 1600)
+#define PICOJSON_USE_RVALUE_REFERENCE 1
+#else
+#define PICOJSON_USE_RVALUE_REFERENCE 0
+#endif
+#endif // PICOJSON_USE_RVALUE_REFERENCE
+
+#ifndef PICOJSON_NOEXCEPT
+#if PICOJSON_USE_RVALUE_REFERENCE
+#define PICOJSON_NOEXCEPT noexcept
+#else
+#define PICOJSON_NOEXCEPT throw()
+#endif
+#endif
+
+// experimental support for int64_t (see README.mkdn for detail)
+#ifdef PICOJSON_USE_INT64
#ifndef __STDC_FORMAT_MACROS
-#define __STDC_FORMAT_MACROS
-#endif
-
-#include <errno.h>
-#include <inttypes.h>
-#endif
-
-// to disable the use of localeconv(3), set PICOJSON_USE_LOCALE to 0
-#ifndef PICOJSON_USE_LOCALE
-#define PICOJSON_USE_LOCALE 1
-#endif
-#if PICOJSON_USE_LOCALE
-extern "C" {
-#include <locale.h>
-}
-#endif
-
-#ifndef PICOJSON_ASSERT
-#define PICOJSON_ASSERT(e) \
- do { \
- if (!(e)) \
- throw std::runtime_error(#e); \
- } while (0)
-#endif
-
-#ifdef _MSC_VER
-#define SNPRINTF _snprintf_s
-#pragma warning(push)
-#pragma warning(disable : 4244) // conversion from int to char
-#pragma warning(disable : 4127) // conditional expression is constant
-#pragma warning(disable : 4702) // unreachable code
-#else
-#define SNPRINTF snprintf
-#endif
-
-namespace picojson {
-
-enum {
- null_type,
- boolean_type,
- number_type,
- string_type,
- array_type,
- object_type
-#ifdef PICOJSON_USE_INT64
- ,
- int64_type
-#endif
-};
-
-enum { INDENT_WIDTH = 2 };
-
-struct null {};
-
-class value {
-public:
- typedef std::vector<value> array;
- typedef std::map<std::string, value> object;
- union _storage {
- bool boolean_;
- double number_;
-#ifdef PICOJSON_USE_INT64
- int64_t int64_;
-#endif
- std::string *string_;
- array *array_;
- object *object_;
- };
-
-protected:
- int type_;
- _storage u_;
-
-public:
- value();
- value(int type, bool);
- explicit value(bool b);
-#ifdef PICOJSON_USE_INT64
- explicit value(int64_t i);
-#endif
- explicit value(double n);
- explicit value(const std::string &s);
- explicit value(const array &a);
- explicit value(const object &o);
-#if PICOJSON_USE_RVALUE_REFERENCE
- explicit value(std::string &&s);
- explicit value(array &&a);
- explicit value(object &&o);
-#endif
- explicit value(const char *s);
- value(const char *s, size_t len);
- ~value();
- value(const value &x);
- value &operator=(const value &x);
-#if PICOJSON_USE_RVALUE_REFERENCE
- value(value &&x) PICOJSON_NOEXCEPT;
- value &operator=(value &&x) PICOJSON_NOEXCEPT;
+#define __STDC_FORMAT_MACROS
#endif
- void swap(value &x) PICOJSON_NOEXCEPT;
- template <typename T> bool is() const;
- template <typename T> const T &get() const;
- template <typename T> T &get();
- template <typename T> void set(const T &);
-#if PICOJSON_USE_RVALUE_REFERENCE
- template <typename T> void set(T &&);
-#endif
- bool evaluate_as_boolean() const;
- const value &get(const size_t idx) const;
- const value &get(const std::string &key) const;
- value &get(const size_t idx);
- value &get(const std::string &key);
-
- bool contains(const size_t idx) const;
- bool contains(const std::string &key) const;
- std::string to_str() const;
- template <typename Iter> void serialize(Iter os, bool prettify = false) const;
- std::string serialize(bool prettify = false) const;
-
-private:
- template <typename T> value(const T *); // intentionally defined to block implicit conversion of pointer to bool
- template <typename Iter> static void _indent(Iter os, int indent);
- template <typename Iter> void _serialize(Iter os, int indent) const;
- std::string _serialize(int indent) const;
- void clear();
-};
-
-typedef value::array array;
-typedef value::object object;
-
-inline value::value() : type_(null_type), u_() {
-}
-
-inline value::value(int type, bool) : type_(type), u_() {
- switch (type) {
-#define INIT(p, v) \
- case p##type: \
- u_.p = v; \
- break
- INIT(boolean_, false);
- INIT(number_, 0.0);
-#ifdef PICOJSON_USE_INT64
- INIT(int64_, 0);
-#endif
- INIT(string_, new std::string());
- INIT(array_, new array());
- INIT(object_, new object());
-#undef INIT
- default:
- break;
- }
-}
-
-inline value::value(bool b) : type_(boolean_type), u_() {
- u_.boolean_ = b;
-}
-#ifdef PICOJSON_USE_INT64
-inline value::value(int64_t i) : type_(int64_type), u_() {
- u_.int64_ = i;
-}
-#endif
-
-inline value::value(double n) : type_(number_type), u_() {
- if (
+#include <errno.h>
+#include <inttypes.h>
+#endif
+
+// to disable the use of localeconv(3), set PICOJSON_USE_LOCALE to 0
+#ifndef PICOJSON_USE_LOCALE
+#define PICOJSON_USE_LOCALE 1
+#endif
+#if PICOJSON_USE_LOCALE
+extern "C" {
+#include <locale.h>
+}
+#endif
+
+#ifndef PICOJSON_ASSERT
+#define PICOJSON_ASSERT(e) \
+ do { \
+ if (!(e)) \
+ throw std::runtime_error(#e); \
+ } while (0)
+#endif
+
+#ifdef _MSC_VER
+#define SNPRINTF _snprintf_s
+#pragma warning(push)
+#pragma warning(disable : 4244) // conversion from int to char
+#pragma warning(disable : 4127) // conditional expression is constant
+#pragma warning(disable : 4702) // unreachable code
+#else
+#define SNPRINTF snprintf
+#endif
+
+namespace picojson {
+
+enum {
+ null_type,
+ boolean_type,
+ number_type,
+ string_type,
+ array_type,
+ object_type
+#ifdef PICOJSON_USE_INT64
+ ,
+ int64_type
+#endif
+};
+
+enum { INDENT_WIDTH = 2 };
+
+struct null {};
+
+class value {
+public:
+ typedef std::vector<value> array;
+ typedef std::map<std::string, value> object;
+ union _storage {
+ bool boolean_;
+ double number_;
+#ifdef PICOJSON_USE_INT64
+ int64_t int64_;
+#endif
+ std::string *string_;
+ array *array_;
+ object *object_;
+ };
+
+protected:
+ int type_;
+ _storage u_;
+
+public:
+ value();
+ value(int type, bool);
+ explicit value(bool b);
+#ifdef PICOJSON_USE_INT64
+ explicit value(int64_t i);
+#endif
+ explicit value(double n);
+ explicit value(const std::string &s);
+ explicit value(const array &a);
+ explicit value(const object &o);
+#if PICOJSON_USE_RVALUE_REFERENCE
+ explicit value(std::string &&s);
+ explicit value(array &&a);
+ explicit value(object &&o);
+#endif
+ explicit value(const char *s);
+ value(const char *s, size_t len);
+ ~value();
+ value(const value &x);
+ value &operator=(const value &x);
+#if PICOJSON_USE_RVALUE_REFERENCE
+ value(value &&x) PICOJSON_NOEXCEPT;
+ value &operator=(value &&x) PICOJSON_NOEXCEPT;
+#endif
+ void swap(value &x) PICOJSON_NOEXCEPT;
+ template <typename T> bool is() const;
+ template <typename T> const T &get() const;
+ template <typename T> T &get();
+ template <typename T> void set(const T &);
+#if PICOJSON_USE_RVALUE_REFERENCE
+ template <typename T> void set(T &&);
+#endif
+ bool evaluate_as_boolean() const;
+ const value &get(const size_t idx) const;
+ const value &get(const std::string &key) const;
+ value &get(const size_t idx);
+ value &get(const std::string &key);
+
+ bool contains(const size_t idx) const;
+ bool contains(const std::string &key) const;
+ std::string to_str() const;
+ template <typename Iter> void serialize(Iter os, bool prettify = false) const;
+ std::string serialize(bool prettify = false) const;
+
+private:
+ template <typename T> value(const T *); // intentionally defined to block implicit conversion of pointer to bool
+ template <typename Iter> static void _indent(Iter os, int indent);
+ template <typename Iter> void _serialize(Iter os, int indent) const;
+ std::string _serialize(int indent) const;
+ void clear();
+};
+
+typedef value::array array;
+typedef value::object object;
+
+inline value::value() : type_(null_type), u_() {
+}
+
+inline value::value(int type, bool) : type_(type), u_() {
+ switch (type) {
+#define INIT(p, v) \
+ case p##type: \
+ u_.p = v; \
+ break
+ INIT(boolean_, false);
+ INIT(number_, 0.0);
+#ifdef PICOJSON_USE_INT64
+ INIT(int64_, 0);
+#endif
+ INIT(string_, new std::string());
+ INIT(array_, new array());
+ INIT(object_, new object());
+#undef INIT
+ default:
+ break;
+ }
+}
+
+inline value::value(bool b) : type_(boolean_type), u_() {
+ u_.boolean_ = b;
+}
+
+#ifdef PICOJSON_USE_INT64
+inline value::value(int64_t i) : type_(int64_type), u_() {
+ u_.int64_ = i;
+}
+#endif
+
+inline value::value(double n) : type_(number_type), u_() {
+ if (
#if defined(_MSC_VER) && !defined(__clang__)
- !_finite(n)
-#elif __cplusplus >= 201103L
- std::isnan(n) || std::isinf(n)
-#else
- isnan(n) || isinf(n)
-#endif
- ) {
- throw std::overflow_error("");
- }
- u_.number_ = n;
-}
-
-inline value::value(const std::string &s) : type_(string_type), u_() {
- u_.string_ = new std::string(s);
-}
-
-inline value::value(const array &a) : type_(array_type), u_() {
- u_.array_ = new array(a);
-}
-
-inline value::value(const object &o) : type_(object_type), u_() {
- u_.object_ = new object(o);
-}
-
-#if PICOJSON_USE_RVALUE_REFERENCE
-inline value::value(std::string &&s) : type_(string_type), u_() {
- u_.string_ = new std::string(std::move(s));
-}
-
-inline value::value(array &&a) : type_(array_type), u_() {
- u_.array_ = new array(std::move(a));
-}
-
-inline value::value(object &&o) : type_(object_type), u_() {
- u_.object_ = new object(std::move(o));
-}
-#endif
-
-inline value::value(const char *s) : type_(string_type), u_() {
- u_.string_ = new std::string(s);
-}
-
-inline value::value(const char *s, size_t len) : type_(string_type), u_() {
- u_.string_ = new std::string(s, len);
-}
-
-inline void value::clear() {
- switch (type_) {
-#define DEINIT(p) \
- case p##type: \
- delete u_.p; \
- break
- DEINIT(string_);
- DEINIT(array_);
- DEINIT(object_);
-#undef DEINIT
- default:
- break;
- }
-}
-
-inline value::~value() {
- clear();
-}
-
-inline value::value(const value &x) : type_(x.type_), u_() {
- switch (type_) {
-#define INIT(p, v) \
- case p##type: \
- u_.p = v; \
- break
- INIT(string_, new std::string(*x.u_.string_));
- INIT(array_, new array(*x.u_.array_));
- INIT(object_, new object(*x.u_.object_));
-#undef INIT
- default:
- u_ = x.u_;
- break;
- }
-}
-
-inline value &value::operator=(const value &x) {
- if (this != &x) {
- value t(x);
- swap(t);
- }
- return *this;
-}
-
-#if PICOJSON_USE_RVALUE_REFERENCE
-inline value::value(value &&x) PICOJSON_NOEXCEPT : type_(null_type), u_() {
- swap(x);
-}
-inline value &value::operator=(value &&x) PICOJSON_NOEXCEPT {
- swap(x);
- return *this;
-}
-#endif
-inline void value::swap(value &x) PICOJSON_NOEXCEPT {
- std::swap(type_, x.type_);
- std::swap(u_, x.u_);
-}
-
-#define IS(ctype, jtype) \
- template <> inline bool value::is<ctype>() const { \
- return type_ == jtype##_type; \
- }
-IS(null, null)
-IS(bool, boolean)
-#ifdef PICOJSON_USE_INT64
-IS(int64_t, int64)
-#endif
-IS(std::string, string)
-IS(array, array)
-IS(object, object)
-#undef IS
-template <> inline bool value::is<double>() const {
- return type_ == number_type
-#ifdef PICOJSON_USE_INT64
- || type_ == int64_type
-#endif
- ;
-}
-
-#define GET(ctype, var) \
- template <> inline const ctype &value::get<ctype>() const { \
- PICOJSON_ASSERT("type mismatch! call is<type>() before get<type>()" && is<ctype>()); \
- return var; \
- } \
- template <> inline ctype &value::get<ctype>() { \
- PICOJSON_ASSERT("type mismatch! call is<type>() before get<type>()" && is<ctype>()); \
- return var; \
- }
-GET(bool, u_.boolean_)
-GET(std::string, *u_.string_)
-GET(array, *u_.array_)
-GET(object, *u_.object_)
-#ifdef PICOJSON_USE_INT64
-GET(double,
- (type_ == int64_type && (const_cast<value *>(this)->type_ = number_type, const_cast<value *>(this)->u_.number_ = u_.int64_),
- u_.number_))
-GET(int64_t, u_.int64_)
-#else
-GET(double, u_.number_)
-#endif
-#undef GET
-
-#define SET(ctype, jtype, setter) \
- template <> inline void value::set<ctype>(const ctype &_val) { \
- clear(); \
- type_ = jtype##_type; \
- setter \
- }
-SET(bool, boolean, u_.boolean_ = _val;)
-SET(std::string, string, u_.string_ = new std::string(_val);)
-SET(array, array, u_.array_ = new array(_val);)
-SET(object, object, u_.object_ = new object(_val);)
-SET(double, number, u_.number_ = _val;)
-#ifdef PICOJSON_USE_INT64
-SET(int64_t, int64, u_.int64_ = _val;)
-#endif
-#undef SET
-
-#if PICOJSON_USE_RVALUE_REFERENCE
-#define MOVESET(ctype, jtype, setter) \
- template <> inline void value::set<ctype>(ctype && _val) { \
- clear(); \
- type_ = jtype##_type; \
- setter \
- }
-MOVESET(std::string, string, u_.string_ = new std::string(std::move(_val));)
-MOVESET(array, array, u_.array_ = new array(std::move(_val));)
-MOVESET(object, object, u_.object_ = new object(std::move(_val));)
-#undef MOVESET
-#endif
-
-inline bool value::evaluate_as_boolean() const {
- switch (type_) {
- case null_type:
- return false;
- case boolean_type:
- return u_.boolean_;
- case number_type:
- return u_.number_ != 0;
-#ifdef PICOJSON_USE_INT64
- case int64_type:
- return u_.int64_ != 0;
-#endif
- case string_type:
- return !u_.string_->empty();
- default:
- return true;
- }
-}
-
-inline const value &value::get(const size_t idx) const {
- static value s_null;
- PICOJSON_ASSERT(is<array>());
- return idx < u_.array_->size() ? (*u_.array_)[idx] : s_null;
-}
-
-inline value &value::get(const size_t idx) {
- static value s_null;
- PICOJSON_ASSERT(is<array>());
- return idx < u_.array_->size() ? (*u_.array_)[idx] : s_null;
-}
-
-inline const value &value::get(const std::string &key) const {
- static value s_null;
- PICOJSON_ASSERT(is<object>());
- object::const_iterator i = u_.object_->find(key);
- return i != u_.object_->end() ? i->second : s_null;
-}
-
-inline value &value::get(const std::string &key) {
- static value s_null;
- PICOJSON_ASSERT(is<object>());
- object::iterator i = u_.object_->find(key);
- return i != u_.object_->end() ? i->second : s_null;
-}
-
-inline bool value::contains(const size_t idx) const {
- PICOJSON_ASSERT(is<array>());
- return idx < u_.array_->size();
-}
-
-inline bool value::contains(const std::string &key) const {
- PICOJSON_ASSERT(is<object>());
- object::const_iterator i = u_.object_->find(key);
- return i != u_.object_->end();
-}
-
-inline std::string value::to_str() const {
- switch (type_) {
- case null_type:
- return "null";
- case boolean_type:
- return u_.boolean_ ? "true" : "false";
-#ifdef PICOJSON_USE_INT64
- case int64_type: {
- char buf[sizeof("-9223372036854775808")];
- SNPRINTF(buf, sizeof(buf), "%" PRId64, u_.int64_);
- return buf;
- }
-#endif
- case number_type: {
- char buf[256];
- double tmp;
- SNPRINTF(buf, sizeof(buf), fabs(u_.number_) < (1ULL << 53) && modf(u_.number_, &tmp) == 0 ? "%.f" : "%.17g", u_.number_);
-#if PICOJSON_USE_LOCALE
- char *decimal_point = localeconv()->decimal_point;
- if (strcmp(decimal_point, ".") != 0) {
- size_t decimal_point_len = strlen(decimal_point);
- for (char *p = buf; *p != '\0'; ++p) {
- if (strncmp(p, decimal_point, decimal_point_len) == 0) {
- return std::string(buf, p) + "." + (p + decimal_point_len);
- }
- }
- }
-#endif
- return buf;
- }
- case string_type:
- return *u_.string_;
- case array_type:
- return "array";
- case object_type:
- return "object";
- default:
- PICOJSON_ASSERT(0);
-#ifdef _MSC_VER
- __assume(0);
-#endif
- }
- return std::string();
-}
-
-template <typename Iter> void copy(const std::string &s, Iter oi) {
- std::copy(s.begin(), s.end(), oi);
-}
-
-template <typename Iter> struct serialize_str_char {
- Iter oi;
- void operator()(char c) {
- switch (c) {
-#define MAP(val, sym) \
- case val: \
- copy(sym, oi); \
- break
- MAP('"', "\\\"");
- MAP('\\', "\\\\");
- MAP('/', "\\/");
- MAP('\b', "\\b");
- MAP('\f', "\\f");
- MAP('\n', "\\n");
- MAP('\r', "\\r");
- MAP('\t', "\\t");
-#undef MAP
- default:
- if (static_cast<unsigned char>(c) < 0x20 || c == 0x7f) {
- char buf[7];
- SNPRINTF(buf, sizeof(buf), "\\u%04x", c & 0xff);
- copy(buf, buf + 6, oi);
- } else {
- *oi++ = c;
- }
- break;
- }
- }
-};
-
-template <typename Iter> void serialize_str(const std::string &s, Iter oi) {
- *oi++ = '"';
- serialize_str_char<Iter> process_char = {oi};
- std::for_each(s.begin(), s.end(), process_char);
- *oi++ = '"';
-}
-
-template <typename Iter> void value::serialize(Iter oi, bool prettify) const {
- return _serialize(oi, prettify ? 0 : -1);
-}
-
-inline std::string value::serialize(bool prettify) const {
- return _serialize(prettify ? 0 : -1);
-}
-
-template <typename Iter> void value::_indent(Iter oi, int indent) {
- *oi++ = '\n';
- for (int i = 0; i < indent * INDENT_WIDTH; ++i) {
- *oi++ = ' ';
- }
-}
-
-template <typename Iter> void value::_serialize(Iter oi, int indent) const {
- switch (type_) {
- case string_type:
- serialize_str(*u_.string_, oi);
- break;
- case array_type: {
- *oi++ = '[';
- if (indent != -1) {
- ++indent;
- }
- for (array::const_iterator i = u_.array_->begin(); i != u_.array_->end(); ++i) {
- if (i != u_.array_->begin()) {
- *oi++ = ',';
- }
- if (indent != -1) {
- _indent(oi, indent);
- }
- i->_serialize(oi, indent);
- }
- if (indent != -1) {
- --indent;
- if (!u_.array_->empty()) {
- _indent(oi, indent);
- }
- }
- *oi++ = ']';
- break;
- }
- case object_type: {
- *oi++ = '{';
- if (indent != -1) {
- ++indent;
- }
- for (object::const_iterator i = u_.object_->begin(); i != u_.object_->end(); ++i) {
- if (i != u_.object_->begin()) {
- *oi++ = ',';
- }
- if (indent != -1) {
- _indent(oi, indent);
- }
- serialize_str(i->first, oi);
- *oi++ = ':';
- if (indent != -1) {
- *oi++ = ' ';
- }
- i->second._serialize(oi, indent);
- }
- if (indent != -1) {
- --indent;
- if (!u_.object_->empty()) {
- _indent(oi, indent);
- }
- }
- *oi++ = '}';
- break;
- }
- default:
- copy(to_str(), oi);
- break;
- }
- if (indent == 0) {
- *oi++ = '\n';
- }
-}
-
-inline std::string value::_serialize(int indent) const {
- std::string s;
- _serialize(std::back_inserter(s), indent);
- return s;
-}
-
-template <typename Iter> class input {
-protected:
- Iter cur_, end_;
- bool consumed_;
- int line_;
-
-public:
- input(const Iter &first, const Iter &last) : cur_(first), end_(last), consumed_(false), line_(1) {
- }
- int getc() {
- if (consumed_) {
- if (*cur_ == '\n') {
- ++line_;
- }
- ++cur_;
- }
- if (cur_ == end_) {
- consumed_ = false;
- return -1;
- }
- consumed_ = true;
- return *cur_ & 0xff;
- }
- void ungetc() {
- consumed_ = false;
- }
- Iter cur() const {
- if (consumed_) {
- input<Iter> *self = const_cast<input<Iter> *>(this);
- self->consumed_ = false;
- ++self->cur_;
- }
- return cur_;
- }
- int line() const {
- return line_;
- }
- void skip_ws() {
- while (1) {
- int ch = getc();
- if (!(ch == ' ' || ch == '\t' || ch == '\n' || ch == '\r')) {
- ungetc();
- break;
- }
- }
- }
- bool expect(const int expected) {
- skip_ws();
- if (getc() != expected) {
- ungetc();
- return false;
- }
- return true;
- }
- bool match(const std::string &pattern) {
- for (std::string::const_iterator pi(pattern.begin()); pi != pattern.end(); ++pi) {
- if (getc() != *pi) {
- ungetc();
- return false;
- }
- }
- return true;
- }
-};
-
-template <typename Iter> inline int _parse_quadhex(input<Iter> &in) {
- int uni_ch = 0, hex;
- for (int i = 0; i < 4; i++) {
- if ((hex = in.getc()) == -1) {
- return -1;
- }
- if ('0' <= hex && hex <= '9') {
- hex -= '0';
- } else if ('A' <= hex && hex <= 'F') {
- hex -= 'A' - 0xa;
- } else if ('a' <= hex && hex <= 'f') {
- hex -= 'a' - 0xa;
- } else {
- in.ungetc();
- return -1;
- }
- uni_ch = uni_ch * 16 + hex;
- }
- return uni_ch;
-}
-
-template <typename String, typename Iter> inline bool _parse_codepoint(String &out, input<Iter> &in) {
- int uni_ch;
- if ((uni_ch = _parse_quadhex(in)) == -1) {
- return false;
- }
- if (0xd800 <= uni_ch && uni_ch <= 0xdfff) {
- if (0xdc00 <= uni_ch) {
- // a second 16-bit of a surrogate pair appeared
- return false;
- }
- // first 16-bit of surrogate pair, get the next one
- if (in.getc() != '\\' || in.getc() != 'u') {
- in.ungetc();
- return false;
- }
- int second = _parse_quadhex(in);
- if (!(0xdc00 <= second && second <= 0xdfff)) {
- return false;
- }
- uni_ch = ((uni_ch - 0xd800) << 10) | ((second - 0xdc00) & 0x3ff);
- uni_ch += 0x10000;
- }
- if (uni_ch < 0x80) {
- out.push_back(static_cast<char>(uni_ch));
- } else {
- if (uni_ch < 0x800) {
- out.push_back(static_cast<char>(0xc0 | (uni_ch >> 6)));
- } else {
- if (uni_ch < 0x10000) {
- out.push_back(static_cast<char>(0xe0 | (uni_ch >> 12)));
- } else {
- out.push_back(static_cast<char>(0xf0 | (uni_ch >> 18)));
- out.push_back(static_cast<char>(0x80 | ((uni_ch >> 12) & 0x3f)));
- }
- out.push_back(static_cast<char>(0x80 | ((uni_ch >> 6) & 0x3f)));
- }
- out.push_back(static_cast<char>(0x80 | (uni_ch & 0x3f)));
- }
- return true;
-}
-
-template <typename String, typename Iter> inline bool _parse_string(String &out, input<Iter> &in) {
- while (1) {
- int ch = in.getc();
- if (ch < ' ') {
- in.ungetc();
- return false;
- } else if (ch == '"') {
- return true;
- } else if (ch == '\\') {
- if ((ch = in.getc()) == -1) {
- return false;
- }
- switch (ch) {
-#define MAP(sym, val) \
- case sym: \
- out.push_back(val); \
- break
- MAP('"', '\"');
- MAP('\\', '\\');
- MAP('/', '/');
- MAP('b', '\b');
- MAP('f', '\f');
- MAP('n', '\n');
- MAP('r', '\r');
- MAP('t', '\t');
-#undef MAP
- case 'u':
- if (!_parse_codepoint(out, in)) {
- return false;
- }
- break;
- default:
- return false;
- }
- } else {
- out.push_back(static_cast<char>(ch));
- }
- }
- return false;
-}
-
-template <typename Context, typename Iter> inline bool _parse_array(Context &ctx, input<Iter> &in) {
- if (!ctx.parse_array_start()) {
- return false;
- }
- size_t idx = 0;
- if (in.expect(']')) {
- return ctx.parse_array_stop(idx);
- }
- do {
- if (!ctx.parse_array_item(in, idx)) {
- return false;
- }
- idx++;
- } while (in.expect(','));
- return in.expect(']') && ctx.parse_array_stop(idx);
-}
-
-template <typename Context, typename Iter> inline bool _parse_object(Context &ctx, input<Iter> &in) {
- if (!ctx.parse_object_start()) {
- return false;
- }
- if (in.expect('}')) {
- return true;
- }
- do {
- std::string key;
- if (!in.expect('"') || !_parse_string(key, in) || !in.expect(':')) {
- return false;
- }
- if (!ctx.parse_object_item(in, key)) {
- return false;
- }
- } while (in.expect(','));
- return in.expect('}');
-}
-
-template <typename Iter> inline std::string _parse_number(input<Iter> &in) {
- std::string num_str;
- while (1) {
- int ch = in.getc();
- if (('0' <= ch && ch <= '9') || ch == '+' || ch == '-' || ch == 'e' || ch == 'E') {
- num_str.push_back(static_cast<char>(ch));
- } else if (ch == '.') {
-#if PICOJSON_USE_LOCALE
- num_str += localeconv()->decimal_point;
-#else
- num_str.push_back('.');
-#endif
- } else {
- in.ungetc();
- break;
- }
- }
- return num_str;
-}
-
-template <typename Context, typename Iter> inline bool _parse(Context &ctx, input<Iter> &in) {
- in.skip_ws();
- int ch = in.getc();
- switch (ch) {
-#define IS(ch, text, op) \
- case ch: \
- if (in.match(text) && op) { \
- return true; \
- } else { \
- return false; \
- }
- IS('n', "ull", ctx.set_null());
- IS('f', "alse", ctx.set_bool(false));
- IS('t', "rue", ctx.set_bool(true));
-#undef IS
- case '"':
- return ctx.parse_string(in);
- case '[':
- return _parse_array(ctx, in);
- case '{':
- return _parse_object(ctx, in);
- default:
- if (('0' <= ch && ch <= '9') || ch == '-') {
- double f;
- char *endp;
- in.ungetc();
- std::string num_str(_parse_number(in));
- if (num_str.empty()) {
- return false;
- }
-#ifdef PICOJSON_USE_INT64
- {
- errno = 0;
- intmax_t ival = strtoimax(num_str.c_str(), &endp, 10);
- if (errno == 0 && std::numeric_limits<int64_t>::min() <= ival && ival <= std::numeric_limits<int64_t>::max() &&
- endp == num_str.c_str() + num_str.size()) {
- ctx.set_int64(ival);
- return true;
- }
- }
-#endif
- f = strtod(num_str.c_str(), &endp);
- if (endp == num_str.c_str() + num_str.size()) {
- ctx.set_number(f);
- return true;
- }
- return false;
- }
- break;
- }
- in.ungetc();
- return false;
-}
-
-class deny_parse_context {
-public:
- bool set_null() {
- return false;
- }
- bool set_bool(bool) {
- return false;
- }
-#ifdef PICOJSON_USE_INT64
- bool set_int64(int64_t) {
- return false;
- }
-#endif
- bool set_number(double) {
- return false;
- }
- template <typename Iter> bool parse_string(input<Iter> &) {
- return false;
- }
- bool parse_array_start() {
- return false;
- }
- template <typename Iter> bool parse_array_item(input<Iter> &, size_t) {
- return false;
- }
- bool parse_array_stop(size_t) {
- return false;
- }
- bool parse_object_start() {
- return false;
- }
- template <typename Iter> bool parse_object_item(input<Iter> &, const std::string &) {
- return false;
- }
-};
-
-class default_parse_context {
-protected:
- value *out_;
-
-public:
- default_parse_context(value *out) : out_(out) {
- }
- bool set_null() {
- *out_ = value();
- return true;
- }
- bool set_bool(bool b) {
- *out_ = value(b);
- return true;
- }
-#ifdef PICOJSON_USE_INT64
- bool set_int64(int64_t i) {
- *out_ = value(i);
- return true;
- }
-#endif
- bool set_number(double f) {
- *out_ = value(f);
- return true;
- }
- template <typename Iter> bool parse_string(input<Iter> &in) {
- *out_ = value(string_type, false);
- return _parse_string(out_->get<std::string>(), in);
- }
- bool parse_array_start() {
- *out_ = value(array_type, false);
- return true;
- }
- template <typename Iter> bool parse_array_item(input<Iter> &in, size_t) {
- array &a = out_->get<array>();
- a.push_back(value());
- default_parse_context ctx(&a.back());
- return _parse(ctx, in);
- }
- bool parse_array_stop(size_t) {
- return true;
- }
- bool parse_object_start() {
- *out_ = value(object_type, false);
- return true;
- }
- template <typename Iter> bool parse_object_item(input<Iter> &in, const std::string &key) {
- object &o = out_->get<object>();
- default_parse_context ctx(&o[key]);
- return _parse(ctx, in);
- }
-
-private:
- default_parse_context(const default_parse_context &);
- default_parse_context &operator=(const default_parse_context &);
-};
-
-class null_parse_context {
-public:
- struct dummy_str {
- void push_back(int) {
- }
- };
-
-public:
- null_parse_context() {
- }
- bool set_null() {
- return true;
- }
- bool set_bool(bool) {
- return true;
- }
-#ifdef PICOJSON_USE_INT64
- bool set_int64(int64_t) {
- return true;
- }
-#endif
- bool set_number(double) {
- return true;
- }
- template <typename Iter> bool parse_string(input<Iter> &in) {
- dummy_str s;
- return _parse_string(s, in);
- }
- bool parse_array_start() {
- return true;
- }
- template <typename Iter> bool parse_array_item(input<Iter> &in, size_t) {
- return _parse(*this, in);
- }
- bool parse_array_stop(size_t) {
- return true;
- }
- bool parse_object_start() {
- return true;
- }
- template <typename Iter> bool parse_object_item(input<Iter> &in, const std::string &) {
- return _parse(*this, in);
- }
-
-private:
- null_parse_context(const null_parse_context &);
- null_parse_context &operator=(const null_parse_context &);
-};
-
-// obsolete, use the version below
-template <typename Iter> inline std::string parse(value &out, Iter &pos, const Iter &last) {
- std::string err;
- pos = parse(out, pos, last, &err);
- return err;
-}
-
-template <typename Context, typename Iter> inline Iter _parse(Context &ctx, const Iter &first, const Iter &last, std::string *err) {
- input<Iter> in(first, last);
- if (!_parse(ctx, in) && err != NULL) {
- char buf[64];
- SNPRINTF(buf, sizeof(buf), "syntax error at line %d near: ", in.line());
- *err = buf;
- while (1) {
- int ch = in.getc();
- if (ch == -1 || ch == '\n') {
- break;
- } else if (ch >= ' ') {
- err->push_back(static_cast<char>(ch));
- }
- }
- }
- return in.cur();
-}
-
-template <typename Iter> inline Iter parse(value &out, const Iter &first, const Iter &last, std::string *err) {
- default_parse_context ctx(&out);
- return _parse(ctx, first, last, err);
-}
-
-inline std::string parse(value &out, const std::string &s) {
- std::string err;
- parse(out, s.begin(), s.end(), &err);
- return err;
-}
-
-inline std::string parse(value &out, std::istream &is) {
- std::string err;
- parse(out, std::istreambuf_iterator<char>(is.rdbuf()), std::istreambuf_iterator<char>(), &err);
- return err;
-}
-
-template <typename T> struct last_error_t { static std::string s; };
-template <typename T> std::string last_error_t<T>::s;
-
-inline void set_last_error(const std::string &s) {
- last_error_t<bool>::s = s;
-}
-
-inline const std::string &get_last_error() {
- return last_error_t<bool>::s;
-}
-
-inline bool operator==(const value &x, const value &y) {
- if (x.is<null>())
- return y.is<null>();
-#define PICOJSON_CMP(type) \
- if (x.is<type>()) \
- return y.is<type>() && x.get<type>() == y.get<type>()
- PICOJSON_CMP(bool);
- PICOJSON_CMP(double);
- PICOJSON_CMP(std::string);
- PICOJSON_CMP(array);
- PICOJSON_CMP(object);
-#undef PICOJSON_CMP
- PICOJSON_ASSERT(0);
-#ifdef _MSC_VER
- __assume(0);
-#endif
- return false;
-}
-
-inline bool operator!=(const value &x, const value &y) {
- return !(x == y);
-}
-}
-
-#if !PICOJSON_USE_RVALUE_REFERENCE
-namespace std {
-template <> inline void swap(picojson::value &x, picojson::value &y) {
- x.swap(y);
-}
-}
-#endif
-
-inline std::istream &operator>>(std::istream &is, picojson::value &x) {
- picojson::set_last_error(std::string());
- const std::string err(picojson::parse(x, is));
- if (!err.empty()) {
- picojson::set_last_error(err);
- is.setstate(std::ios::failbit);
- }
- return is;
-}
-
-inline std::ostream &operator<<(std::ostream &os, const picojson::value &x) {
- x.serialize(std::ostream_iterator<char>(os));
- return os;
-}
-#ifdef _MSC_VER
-#pragma warning(pop)
-#endif
-
+ !_finite(n)
+#elif __cplusplus >= 201103L
+ std::isnan(n) || std::isinf(n)
+#else
+ isnan(n) || isinf(n)
+#endif
+ ) {
+ throw std::overflow_error("");
+ }
+ u_.number_ = n;
+}
+
+inline value::value(const std::string &s) : type_(string_type), u_() {
+ u_.string_ = new std::string(s);
+}
+
+inline value::value(const array &a) : type_(array_type), u_() {
+ u_.array_ = new array(a);
+}
+
+inline value::value(const object &o) : type_(object_type), u_() {
+ u_.object_ = new object(o);
+}
+
+#if PICOJSON_USE_RVALUE_REFERENCE
+inline value::value(std::string &&s) : type_(string_type), u_() {
+ u_.string_ = new std::string(std::move(s));
+}
+
+inline value::value(array &&a) : type_(array_type), u_() {
+ u_.array_ = new array(std::move(a));
+}
+
+inline value::value(object &&o) : type_(object_type), u_() {
+ u_.object_ = new object(std::move(o));
+}
+#endif
+
+inline value::value(const char *s) : type_(string_type), u_() {
+ u_.string_ = new std::string(s);
+}
+
+inline value::value(const char *s, size_t len) : type_(string_type), u_() {
+ u_.string_ = new std::string(s, len);
+}
+
+inline void value::clear() {
+ switch (type_) {
+#define DEINIT(p) \
+ case p##type: \
+ delete u_.p; \
+ break
+ DEINIT(string_);
+ DEINIT(array_);
+ DEINIT(object_);
+#undef DEINIT
+ default:
+ break;
+ }
+}
+
+inline value::~value() {
+ clear();
+}
+
+inline value::value(const value &x) : type_(x.type_), u_() {
+ switch (type_) {
+#define INIT(p, v) \
+ case p##type: \
+ u_.p = v; \
+ break
+ INIT(string_, new std::string(*x.u_.string_));
+ INIT(array_, new array(*x.u_.array_));
+ INIT(object_, new object(*x.u_.object_));
+#undef INIT
+ default:
+ u_ = x.u_;
+ break;
+ }
+}
+
+inline value &value::operator=(const value &x) {
+ if (this != &x) {
+ value t(x);
+ swap(t);
+ }
+ return *this;
+}
+
+#if PICOJSON_USE_RVALUE_REFERENCE
+inline value::value(value &&x) PICOJSON_NOEXCEPT : type_(null_type), u_() {
+ swap(x);
+}
+inline value &value::operator=(value &&x) PICOJSON_NOEXCEPT {
+ swap(x);
+ return *this;
+}
+#endif
+inline void value::swap(value &x) PICOJSON_NOEXCEPT {
+ std::swap(type_, x.type_);
+ std::swap(u_, x.u_);
+}
+
+#define IS(ctype, jtype) \
+ template <> inline bool value::is<ctype>() const { \
+ return type_ == jtype##_type; \
+ }
+IS(null, null)
+IS(bool, boolean)
+#ifdef PICOJSON_USE_INT64
+IS(int64_t, int64)
+#endif
+IS(std::string, string)
+IS(array, array)
+IS(object, object)
+#undef IS
+template <> inline bool value::is<double>() const {
+ return type_ == number_type
+#ifdef PICOJSON_USE_INT64
+ || type_ == int64_type
+#endif
+ ;
+}
+
+#define GET(ctype, var) \
+ template <> inline const ctype &value::get<ctype>() const { \
+ PICOJSON_ASSERT("type mismatch! call is<type>() before get<type>()" && is<ctype>()); \
+ return var; \
+ } \
+ template <> inline ctype &value::get<ctype>() { \
+ PICOJSON_ASSERT("type mismatch! call is<type>() before get<type>()" && is<ctype>()); \
+ return var; \
+ }
+GET(bool, u_.boolean_)
+GET(std::string, *u_.string_)
+GET(array, *u_.array_)
+GET(object, *u_.object_)
+#ifdef PICOJSON_USE_INT64
+GET(double,
+ (type_ == int64_type && (const_cast<value *>(this)->type_ = number_type, const_cast<value *>(this)->u_.number_ = u_.int64_),
+ u_.number_))
+GET(int64_t, u_.int64_)
+#else
+GET(double, u_.number_)
+#endif
+#undef GET
+
+#define SET(ctype, jtype, setter) \
+ template <> inline void value::set<ctype>(const ctype &_val) { \
+ clear(); \
+ type_ = jtype##_type; \
+ setter \
+ }
+SET(bool, boolean, u_.boolean_ = _val;)
+SET(std::string, string, u_.string_ = new std::string(_val);)
+SET(array, array, u_.array_ = new array(_val);)
+SET(object, object, u_.object_ = new object(_val);)
+SET(double, number, u_.number_ = _val;)
+#ifdef PICOJSON_USE_INT64
+SET(int64_t, int64, u_.int64_ = _val;)
+#endif
+#undef SET
+
+#if PICOJSON_USE_RVALUE_REFERENCE
+#define MOVESET(ctype, jtype, setter) \
+ template <> inline void value::set<ctype>(ctype && _val) { \
+ clear(); \
+ type_ = jtype##_type; \
+ setter \
+ }
+MOVESET(std::string, string, u_.string_ = new std::string(std::move(_val));)
+MOVESET(array, array, u_.array_ = new array(std::move(_val));)
+MOVESET(object, object, u_.object_ = new object(std::move(_val));)
+#undef MOVESET
+#endif
+
+inline bool value::evaluate_as_boolean() const {
+ switch (type_) {
+ case null_type:
+ return false;
+ case boolean_type:
+ return u_.boolean_;
+ case number_type:
+ return u_.number_ != 0;
+#ifdef PICOJSON_USE_INT64
+ case int64_type:
+ return u_.int64_ != 0;
+#endif
+ case string_type:
+ return !u_.string_->empty();
+ default:
+ return true;
+ }
+}
+
+inline const value &value::get(const size_t idx) const {
+ static value s_null;
+ PICOJSON_ASSERT(is<array>());
+ return idx < u_.array_->size() ? (*u_.array_)[idx] : s_null;
+}
+
+inline value &value::get(const size_t idx) {
+ static value s_null;
+ PICOJSON_ASSERT(is<array>());
+ return idx < u_.array_->size() ? (*u_.array_)[idx] : s_null;
+}
+
+inline const value &value::get(const std::string &key) const {
+ static value s_null;
+ PICOJSON_ASSERT(is<object>());
+ object::const_iterator i = u_.object_->find(key);
+ return i != u_.object_->end() ? i->second : s_null;
+}
+
+inline value &value::get(const std::string &key) {
+ static value s_null;
+ PICOJSON_ASSERT(is<object>());
+ object::iterator i = u_.object_->find(key);
+ return i != u_.object_->end() ? i->second : s_null;
+}
+
+inline bool value::contains(const size_t idx) const {
+ PICOJSON_ASSERT(is<array>());
+ return idx < u_.array_->size();
+}
+
+inline bool value::contains(const std::string &key) const {
+ PICOJSON_ASSERT(is<object>());
+ object::const_iterator i = u_.object_->find(key);
+ return i != u_.object_->end();
+}
+
+inline std::string value::to_str() const {
+ switch (type_) {
+ case null_type:
+ return "null";
+ case boolean_type:
+ return u_.boolean_ ? "true" : "false";
+#ifdef PICOJSON_USE_INT64
+ case int64_type: {
+ char buf[sizeof("-9223372036854775808")];
+ SNPRINTF(buf, sizeof(buf), "%" PRId64, u_.int64_);
+ return buf;
+ }
+#endif
+ case number_type: {
+ char buf[256];
+ double tmp;
+ SNPRINTF(buf, sizeof(buf), fabs(u_.number_) < (1ULL << 53) && modf(u_.number_, &tmp) == 0 ? "%.f" : "%.17g", u_.number_);
+#if PICOJSON_USE_LOCALE
+ char *decimal_point = localeconv()->decimal_point;
+ if (strcmp(decimal_point, ".") != 0) {
+ size_t decimal_point_len = strlen(decimal_point);
+ for (char *p = buf; *p != '\0'; ++p) {
+ if (strncmp(p, decimal_point, decimal_point_len) == 0) {
+ return std::string(buf, p) + "." + (p + decimal_point_len);
+ }
+ }
+ }
+#endif
+ return buf;
+ }
+ case string_type:
+ return *u_.string_;
+ case array_type:
+ return "array";
+ case object_type:
+ return "object";
+ default:
+ PICOJSON_ASSERT(0);
+#ifdef _MSC_VER
+ __assume(0);
+#endif
+ }
+ return std::string();
+}
+
+template <typename Iter> void copy(const std::string &s, Iter oi) {
+ std::copy(s.begin(), s.end(), oi);
+}
+
+template <typename Iter> struct serialize_str_char {
+ Iter oi;
+ void operator()(char c) {
+ switch (c) {
+#define MAP(val, sym) \
+ case val: \
+ copy(sym, oi); \
+ break
+ MAP('"', "\\\"");
+ MAP('\\', "\\\\");
+ MAP('/', "\\/");
+ MAP('\b', "\\b");
+ MAP('\f', "\\f");
+ MAP('\n', "\\n");
+ MAP('\r', "\\r");
+ MAP('\t', "\\t");
+#undef MAP
+ default:
+ if (static_cast<unsigned char>(c) < 0x20 || c == 0x7f) {
+ char buf[7];
+ SNPRINTF(buf, sizeof(buf), "\\u%04x", c & 0xff);
+ copy(buf, buf + 6, oi);
+ } else {
+ *oi++ = c;
+ }
+ break;
+ }
+ }
+};
+
+template <typename Iter> void serialize_str(const std::string &s, Iter oi) {
+ *oi++ = '"';
+ serialize_str_char<Iter> process_char = {oi};
+ std::for_each(s.begin(), s.end(), process_char);
+ *oi++ = '"';
+}
+
+template <typename Iter> void value::serialize(Iter oi, bool prettify) const {
+ return _serialize(oi, prettify ? 0 : -1);
+}
+
+inline std::string value::serialize(bool prettify) const {
+ return _serialize(prettify ? 0 : -1);
+}
+
+template <typename Iter> void value::_indent(Iter oi, int indent) {
+ *oi++ = '\n';
+ for (int i = 0; i < indent * INDENT_WIDTH; ++i) {
+ *oi++ = ' ';
+ }
+}
+
+template <typename Iter> void value::_serialize(Iter oi, int indent) const {
+ switch (type_) {
+ case string_type:
+ serialize_str(*u_.string_, oi);
+ break;
+ case array_type: {
+ *oi++ = '[';
+ if (indent != -1) {
+ ++indent;
+ }
+ for (array::const_iterator i = u_.array_->begin(); i != u_.array_->end(); ++i) {
+ if (i != u_.array_->begin()) {
+ *oi++ = ',';
+ }
+ if (indent != -1) {
+ _indent(oi, indent);
+ }
+ i->_serialize(oi, indent);
+ }
+ if (indent != -1) {
+ --indent;
+ if (!u_.array_->empty()) {
+ _indent(oi, indent);
+ }
+ }
+ *oi++ = ']';
+ break;
+ }
+ case object_type: {
+ *oi++ = '{';
+ if (indent != -1) {
+ ++indent;
+ }
+ for (object::const_iterator i = u_.object_->begin(); i != u_.object_->end(); ++i) {
+ if (i != u_.object_->begin()) {
+ *oi++ = ',';
+ }
+ if (indent != -1) {
+ _indent(oi, indent);
+ }
+ serialize_str(i->first, oi);
+ *oi++ = ':';
+ if (indent != -1) {
+ *oi++ = ' ';
+ }
+ i->second._serialize(oi, indent);
+ }
+ if (indent != -1) {
+ --indent;
+ if (!u_.object_->empty()) {
+ _indent(oi, indent);
+ }
+ }
+ *oi++ = '}';
+ break;
+ }
+ default:
+ copy(to_str(), oi);
+ break;
+ }
+ if (indent == 0) {
+ *oi++ = '\n';
+ }
+}
+
+inline std::string value::_serialize(int indent) const {
+ std::string s;
+ _serialize(std::back_inserter(s), indent);
+ return s;
+}
+
+template <typename Iter> class input {
+protected:
+ Iter cur_, end_;
+ bool consumed_;
+ int line_;
+
+public:
+ input(const Iter &first, const Iter &last) : cur_(first), end_(last), consumed_(false), line_(1) {
+ }
+ int getc() {
+ if (consumed_) {
+ if (*cur_ == '\n') {
+ ++line_;
+ }
+ ++cur_;
+ }
+ if (cur_ == end_) {
+ consumed_ = false;
+ return -1;
+ }
+ consumed_ = true;
+ return *cur_ & 0xff;
+ }
+ void ungetc() {
+ consumed_ = false;
+ }
+ Iter cur() const {
+ if (consumed_) {
+ input<Iter> *self = const_cast<input<Iter> *>(this);
+ self->consumed_ = false;
+ ++self->cur_;
+ }
+ return cur_;
+ }
+ int line() const {
+ return line_;
+ }
+ void skip_ws() {
+ while (1) {
+ int ch = getc();
+ if (!(ch == ' ' || ch == '\t' || ch == '\n' || ch == '\r')) {
+ ungetc();
+ break;
+ }
+ }
+ }
+ bool expect(const int expected) {
+ skip_ws();
+ if (getc() != expected) {
+ ungetc();
+ return false;
+ }
+ return true;
+ }
+ bool match(const std::string &pattern) {
+ for (std::string::const_iterator pi(pattern.begin()); pi != pattern.end(); ++pi) {
+ if (getc() != *pi) {
+ ungetc();
+ return false;
+ }
+ }
+ return true;
+ }
+};
+
+template <typename Iter> inline int _parse_quadhex(input<Iter> &in) {
+ int uni_ch = 0, hex;
+ for (int i = 0; i < 4; i++) {
+ if ((hex = in.getc()) == -1) {
+ return -1;
+ }
+ if ('0' <= hex && hex <= '9') {
+ hex -= '0';
+ } else if ('A' <= hex && hex <= 'F') {
+ hex -= 'A' - 0xa;
+ } else if ('a' <= hex && hex <= 'f') {
+ hex -= 'a' - 0xa;
+ } else {
+ in.ungetc();
+ return -1;
+ }
+ uni_ch = uni_ch * 16 + hex;
+ }
+ return uni_ch;
+}
+
+template <typename String, typename Iter> inline bool _parse_codepoint(String &out, input<Iter> &in) {
+ int uni_ch;
+ if ((uni_ch = _parse_quadhex(in)) == -1) {
+ return false;
+ }
+ if (0xd800 <= uni_ch && uni_ch <= 0xdfff) {
+ if (0xdc00 <= uni_ch) {
+ // a second 16-bit of a surrogate pair appeared
+ return false;
+ }
+ // first 16-bit of surrogate pair, get the next one
+ if (in.getc() != '\\' || in.getc() != 'u') {
+ in.ungetc();
+ return false;
+ }
+ int second = _parse_quadhex(in);
+ if (!(0xdc00 <= second && second <= 0xdfff)) {
+ return false;
+ }
+ uni_ch = ((uni_ch - 0xd800) << 10) | ((second - 0xdc00) & 0x3ff);
+ uni_ch += 0x10000;
+ }
+ if (uni_ch < 0x80) {
+ out.push_back(static_cast<char>(uni_ch));
+ } else {
+ if (uni_ch < 0x800) {
+ out.push_back(static_cast<char>(0xc0 | (uni_ch >> 6)));
+ } else {
+ if (uni_ch < 0x10000) {
+ out.push_back(static_cast<char>(0xe0 | (uni_ch >> 12)));
+ } else {
+ out.push_back(static_cast<char>(0xf0 | (uni_ch >> 18)));
+ out.push_back(static_cast<char>(0x80 | ((uni_ch >> 12) & 0x3f)));
+ }
+ out.push_back(static_cast<char>(0x80 | ((uni_ch >> 6) & 0x3f)));
+ }
+ out.push_back(static_cast<char>(0x80 | (uni_ch & 0x3f)));
+ }
+ return true;
+}
+
+template <typename String, typename Iter> inline bool _parse_string(String &out, input<Iter> &in) {
+ while (1) {
+ int ch = in.getc();
+ if (ch < ' ') {
+ in.ungetc();
+ return false;
+ } else if (ch == '"') {
+ return true;
+ } else if (ch == '\\') {
+ if ((ch = in.getc()) == -1) {
+ return false;
+ }
+ switch (ch) {
+#define MAP(sym, val) \
+ case sym: \
+ out.push_back(val); \
+ break
+ MAP('"', '\"');
+ MAP('\\', '\\');
+ MAP('/', '/');
+ MAP('b', '\b');
+ MAP('f', '\f');
+ MAP('n', '\n');
+ MAP('r', '\r');
+ MAP('t', '\t');
+#undef MAP
+ case 'u':
+ if (!_parse_codepoint(out, in)) {
+ return false;
+ }
+ break;
+ default:
+ return false;
+ }
+ } else {
+ out.push_back(static_cast<char>(ch));
+ }
+ }
+ return false;
+}
+
+template <typename Context, typename Iter> inline bool _parse_array(Context &ctx, input<Iter> &in) {
+ if (!ctx.parse_array_start()) {
+ return false;
+ }
+ size_t idx = 0;
+ if (in.expect(']')) {
+ return ctx.parse_array_stop(idx);
+ }
+ do {
+ if (!ctx.parse_array_item(in, idx)) {
+ return false;
+ }
+ idx++;
+ } while (in.expect(','));
+ return in.expect(']') && ctx.parse_array_stop(idx);
+}
+
+template <typename Context, typename Iter> inline bool _parse_object(Context &ctx, input<Iter> &in) {
+ if (!ctx.parse_object_start()) {
+ return false;
+ }
+ if (in.expect('}')) {
+ return true;
+ }
+ do {
+ std::string key;
+ if (!in.expect('"') || !_parse_string(key, in) || !in.expect(':')) {
+ return false;
+ }
+ if (!ctx.parse_object_item(in, key)) {
+ return false;
+ }
+ } while (in.expect(','));
+ return in.expect('}');
+}
+
+template <typename Iter> inline std::string _parse_number(input<Iter> &in) {
+ std::string num_str;
+ while (1) {
+ int ch = in.getc();
+ if (('0' <= ch && ch <= '9') || ch == '+' || ch == '-' || ch == 'e' || ch == 'E') {
+ num_str.push_back(static_cast<char>(ch));
+ } else if (ch == '.') {
+#if PICOJSON_USE_LOCALE
+ num_str += localeconv()->decimal_point;
+#else
+ num_str.push_back('.');
+#endif
+ } else {
+ in.ungetc();
+ break;
+ }
+ }
+ return num_str;
+}
+
+template <typename Context, typename Iter> inline bool _parse(Context &ctx, input<Iter> &in) {
+ in.skip_ws();
+ int ch = in.getc();
+ switch (ch) {
+#define IS(ch, text, op) \
+ case ch: \
+ if (in.match(text) && op) { \
+ return true; \
+ } else { \
+ return false; \
+ }
+ IS('n', "ull", ctx.set_null());
+ IS('f', "alse", ctx.set_bool(false));
+ IS('t', "rue", ctx.set_bool(true));
+#undef IS
+ case '"':
+ return ctx.parse_string(in);
+ case '[':
+ return _parse_array(ctx, in);
+ case '{':
+ return _parse_object(ctx, in);
+ default:
+ if (('0' <= ch && ch <= '9') || ch == '-') {
+ double f;
+ char *endp;
+ in.ungetc();
+ std::string num_str(_parse_number(in));
+ if (num_str.empty()) {
+ return false;
+ }
+#ifdef PICOJSON_USE_INT64
+ {
+ errno = 0;
+ intmax_t ival = strtoimax(num_str.c_str(), &endp, 10);
+ if (errno == 0 && std::numeric_limits<int64_t>::min() <= ival && ival <= std::numeric_limits<int64_t>::max() &&
+ endp == num_str.c_str() + num_str.size()) {
+ ctx.set_int64(ival);
+ return true;
+ }
+ }
+#endif
+ f = strtod(num_str.c_str(), &endp);
+ if (endp == num_str.c_str() + num_str.size()) {
+ ctx.set_number(f);
+ return true;
+ }
+ return false;
+ }
+ break;
+ }
+ in.ungetc();
+ return false;
+}
+
+class deny_parse_context {
+public:
+ bool set_null() {
+ return false;
+ }
+ bool set_bool(bool) {
+ return false;
+ }
+#ifdef PICOJSON_USE_INT64
+ bool set_int64(int64_t) {
+ return false;
+ }
+#endif
+ bool set_number(double) {
+ return false;
+ }
+ template <typename Iter> bool parse_string(input<Iter> &) {
+ return false;
+ }
+ bool parse_array_start() {
+ return false;
+ }
+ template <typename Iter> bool parse_array_item(input<Iter> &, size_t) {
+ return false;
+ }
+ bool parse_array_stop(size_t) {
+ return false;
+ }
+ bool parse_object_start() {
+ return false;
+ }
+ template <typename Iter> bool parse_object_item(input<Iter> &, const std::string &) {
+ return false;
+ }
+};
+
+class default_parse_context {
+protected:
+ value *out_;
+
+public:
+ default_parse_context(value *out) : out_(out) {
+ }
+ bool set_null() {
+ *out_ = value();
+ return true;
+ }
+ bool set_bool(bool b) {
+ *out_ = value(b);
+ return true;
+ }
+#ifdef PICOJSON_USE_INT64
+ bool set_int64(int64_t i) {
+ *out_ = value(i);
+ return true;
+ }
+#endif
+ bool set_number(double f) {
+ *out_ = value(f);
+ return true;
+ }
+ template <typename Iter> bool parse_string(input<Iter> &in) {
+ *out_ = value(string_type, false);
+ return _parse_string(out_->get<std::string>(), in);
+ }
+ bool parse_array_start() {
+ *out_ = value(array_type, false);
+ return true;
+ }
+ template <typename Iter> bool parse_array_item(input<Iter> &in, size_t) {
+ array &a = out_->get<array>();
+ a.push_back(value());
+ default_parse_context ctx(&a.back());
+ return _parse(ctx, in);
+ }
+ bool parse_array_stop(size_t) {
+ return true;
+ }
+ bool parse_object_start() {
+ *out_ = value(object_type, false);
+ return true;
+ }
+ template <typename Iter> bool parse_object_item(input<Iter> &in, const std::string &key) {
+ object &o = out_->get<object>();
+ default_parse_context ctx(&o[key]);
+ return _parse(ctx, in);
+ }
+
+private:
+ default_parse_context(const default_parse_context &);
+ default_parse_context &operator=(const default_parse_context &);
+};
+
+class null_parse_context {
+public:
+ struct dummy_str {
+ void push_back(int) {
+ }
+ };
+
+public:
+ null_parse_context() {
+ }
+ bool set_null() {
+ return true;
+ }
+ bool set_bool(bool) {
+ return true;
+ }
+#ifdef PICOJSON_USE_INT64
+ bool set_int64(int64_t) {
+ return true;
+ }
+#endif
+ bool set_number(double) {
+ return true;
+ }
+ template <typename Iter> bool parse_string(input<Iter> &in) {
+ dummy_str s;
+ return _parse_string(s, in);
+ }
+ bool parse_array_start() {
+ return true;
+ }
+ template <typename Iter> bool parse_array_item(input<Iter> &in, size_t) {
+ return _parse(*this, in);
+ }
+ bool parse_array_stop(size_t) {
+ return true;
+ }
+ bool parse_object_start() {
+ return true;
+ }
+ template <typename Iter> bool parse_object_item(input<Iter> &in, const std::string &) {
+ return _parse(*this, in);
+ }
+
+private:
+ null_parse_context(const null_parse_context &);
+ null_parse_context &operator=(const null_parse_context &);
+};
+
+// obsolete, use the version below
+template <typename Iter> inline std::string parse(value &out, Iter &pos, const Iter &last) {
+ std::string err;
+ pos = parse(out, pos, last, &err);
+ return err;
+}
+
+template <typename Context, typename Iter> inline Iter _parse(Context &ctx, const Iter &first, const Iter &last, std::string *err) {
+ input<Iter> in(first, last);
+ if (!_parse(ctx, in) && err != NULL) {
+ char buf[64];
+ SNPRINTF(buf, sizeof(buf), "syntax error at line %d near: ", in.line());
+ *err = buf;
+ while (1) {
+ int ch = in.getc();
+ if (ch == -1 || ch == '\n') {
+ break;
+ } else if (ch >= ' ') {
+ err->push_back(static_cast<char>(ch));
+ }
+ }
+ }
+ return in.cur();
+}
+
+template <typename Iter> inline Iter parse(value &out, const Iter &first, const Iter &last, std::string *err) {
+ default_parse_context ctx(&out);
+ return _parse(ctx, first, last, err);
+}
+
+inline std::string parse(value &out, const std::string &s) {
+ std::string err;
+ parse(out, s.begin(), s.end(), &err);
+ return err;
+}
+
+inline std::string parse(value &out, std::istream &is) {
+ std::string err;
+ parse(out, std::istreambuf_iterator<char>(is.rdbuf()), std::istreambuf_iterator<char>(), &err);
+ return err;
+}
+
+template <typename T> struct last_error_t { static std::string s; };
+template <typename T> std::string last_error_t<T>::s;
+
+inline void set_last_error(const std::string &s) {
+ last_error_t<bool>::s = s;
+}
+
+inline const std::string &get_last_error() {
+ return last_error_t<bool>::s;
+}
+
+inline bool operator==(const value &x, const value &y) {
+ if (x.is<null>())
+ return y.is<null>();
+#define PICOJSON_CMP(type) \
+ if (x.is<type>()) \
+ return y.is<type>() && x.get<type>() == y.get<type>()
+ PICOJSON_CMP(bool);
+ PICOJSON_CMP(double);
+ PICOJSON_CMP(std::string);
+ PICOJSON_CMP(array);
+ PICOJSON_CMP(object);
+#undef PICOJSON_CMP
+ PICOJSON_ASSERT(0);
+#ifdef _MSC_VER
+ __assume(0);
+#endif
+ return false;
+}
+
+inline bool operator!=(const value &x, const value &y) {
+ return !(x == y);
+}
+}
+
+#if !PICOJSON_USE_RVALUE_REFERENCE
+namespace std {
+template <> inline void swap(picojson::value &x, picojson::value &y) {
+ x.swap(y);
+}
+}
+#endif
+
+inline std::istream &operator>>(std::istream &is, picojson::value &x) {
+ picojson::set_last_error(std::string());
+ const std::string err(picojson::parse(x, is));
+ if (!err.empty()) {
+ picojson::set_last_error(err);
+ is.setstate(std::ios::failbit);
+ }
+ return is;
+}
+
+inline std::ostream &operator<<(std::ostream &os, const picojson::value &x) {
+ x.serialize(std::ostream_iterator<char>(os));
+ return os;
+}
+#ifdef _MSC_VER
+#pragma warning(pop)
+#endif
+
#endif \ No newline at end of file
diff --git a/contrib/libs/jwt-cpp/ya.make b/contrib/libs/jwt-cpp/ya.make
index c7ddd33162..ec386335ec 100644
--- a/contrib/libs/jwt-cpp/ya.make
+++ b/contrib/libs/jwt-cpp/ya.make
@@ -1,16 +1,16 @@
# Generated by devtools/yamaker from nixpkgs 04d5f1e3a87d413181af5d6dd68568228addf1c3.
-
-LIBRARY()
-
+
+LIBRARY()
+
OWNER(
pbludov
g:cpp-contrib
)
-VERSION(0.2.0)
-
-ORIGINAL_SOURCE(https://github.com/Thalhammer/jwt-cpp/archive/2b3ddae668f5b0dac92f57207312dc50b5bdb2f8.tar.gz)
-
+VERSION(0.2.0)
+
+ORIGINAL_SOURCE(https://github.com/Thalhammer/jwt-cpp/archive/2b3ddae668f5b0dac92f57207312dc50b5bdb2f8.tar.gz)
+
LICENSE(
BSD-2-Clause AND
MIT
@@ -18,12 +18,12 @@ LICENSE(
LICENSE_TEXTS(.yandex_meta/licenses.list.txt)
-PEERDIR(
- contrib/libs/openssl
-)
-
-NO_COMPILER_WARNINGS()
-
+PEERDIR(
+ contrib/libs/openssl
+)
+
+NO_COMPILER_WARNINGS()
+
NO_RUNTIME()
-
-END()
+
+END()