1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
#![cfg_attr(docsrs, feature(doc_auto_cfg))]

use sshkeys::PublicKeyKind;
use ssi_jwk::{Base64urlUInt, Params as JWKParams, JWK};
use thiserror::Error;

#[derive(Error, Debug)]
pub enum SSHKeyToJWKError {
    #[error("SSH key: {0}")]
    SSHKey(#[from] sshkeys::Error),
    #[error("Unsupported ssh-dsa key")]
    UnsupportedDsaKey,
    #[error("P-256 parse error: {0}")]
    P256Parse(String),
    #[error("Unsupported ECDSA key type: {0}")]
    UnsupportedEcdsaKey(String),
    #[error("Missing features: {0}")]
    MissingFeatures(&'static str),
}

fn pk_to_jwk_rsa(pk: &sshkeys::RsaPublicKey) -> JWK {
    JWK::from(JWKParams::RSA(ssi_jwk::RSAParams::new_public(&pk.e, &pk.n)))
}

fn pk_to_jwk_ecdsa(pk: &sshkeys::EcdsaPublicKey) -> Result<JWK, SSHKeyToJWKError> {
    match pk.curve.kind {
        sshkeys::CurveKind::Nistp256 => {
            #[cfg(not(feature = "secp256r1"))]
            {
                Err(SSHKeyToJWKError::MissingFeatures("secp256r1"))
            }
            #[cfg(feature = "secp256r1")]
            {
                ssi_jwk::p256_parse(&pk.key).map_err(|e| SSHKeyToJWKError::P256Parse(e.to_string()))
            }
        }
        _ => Err(SSHKeyToJWKError::UnsupportedEcdsaKey(
            pk.curve.identifier.to_string(),
        )),
    }
}

fn pk_to_jwk_ed25519(pk: &sshkeys::Ed25519PublicKey) -> JWK {
    JWK::from(JWKParams::OKP(ssi_jwk::OctetParams {
        curve: "Ed25519".to_string(),
        public_key: Base64urlUInt(pk.key.clone()),
        private_key: None,
    }))
}

/// Convert a SSH public key to a JWK.
pub fn ssh_pkk_to_jwk(pkk: &PublicKeyKind) -> Result<JWK, SSHKeyToJWKError> {
    // https://datatracker.ietf.org/doc/html/rfc4253#section-6.6
    // https://datatracker.ietf.org/doc/html/rfc5656#section-3.1
    // https://datatracker.ietf.org/doc/html/draft-ietf-curdle-ssh-ed25519-02#section-4
    let jwk = match pkk {
        PublicKeyKind::Rsa(pk) => pk_to_jwk_rsa(pk),
        PublicKeyKind::Dsa(_) => return Err(SSHKeyToJWKError::UnsupportedDsaKey),
        PublicKeyKind::Ecdsa(pk) => pk_to_jwk_ecdsa(pk)?,
        PublicKeyKind::Ed25519(pk) => pk_to_jwk_ed25519(pk),
    };
    Ok(jwk)
}