lib/plug/crypto/message_verifier.ex

defmodule Plug.Crypto.MessageVerifier do
  @moduledoc """
  `MessageVerifier` makes it easy to generate and verify messages
  which are signed to prevent tampering.

  For example, the cookie store uses this verifier to send data
  to the client. The data can be read by the client, but cannot be
  tampered with.

  The message and its verification are base64url encoded and returned
  to you.

  The current algorithm used is HMAC-SHA, with SHA256, SHA384, and
  SHA512 as supported digest types.
  """

  @doc """
  Signs a message according to the given secret.
  """
  def sign(message, secret, digest_type \\ :sha256)
      when is_binary(message) and byte_size(secret) > 0 and
             digest_type in [:sha256, :sha384, :sha512] do
    hmac_sha2_sign(message, secret, digest_type)
  rescue
    e -> reraise e, Plug.Crypto.prune_args_from_stacktrace(__STACKTRACE__)
  end

  @doc """
  Decodes and verifies the encoded binary was not tampered with.
  """
  def verify(signed, secret) when is_binary(signed) and byte_size(secret) > 0 do
    hmac_sha2_verify(signed, secret)
  rescue
    e -> reraise e, Plug.Crypto.prune_args_from_stacktrace(__STACKTRACE__)
  end

  ## Signature Algorithms

  defp hmac_sha2_to_protected(:sha256), do: "SFMyNTY"
  defp hmac_sha2_to_protected(:sha384), do: "SFMzODQ"
  defp hmac_sha2_to_protected(:sha512), do: "SFM1MTI"

  defp hmac_sha2_to_digest_type("SFMyNTY"), do: :sha256
  defp hmac_sha2_to_digest_type("SFMzODQ"), do: :sha384
  defp hmac_sha2_to_digest_type("SFM1MTI"), do: :sha512

  defp hmac_sha2_sign(payload, key, digest_type) do
    protected = hmac_sha2_to_protected(digest_type)
    plain_text = [protected, ?., Base.url_encode64(payload, padding: false)]
    signature = :crypto.mac(:hmac, digest_type, key, plain_text)
    IO.iodata_to_binary([plain_text, ".", Base.url_encode64(signature, padding: false)])
  end

  defp hmac_sha2_verify(signed, key) when is_binary(signed) and is_binary(key) do
    with [protected, payload, signature] when protected in ["SFMyNTY", "SFMzODQ", "SFM1MTI"] <-
           :binary.split(signed, ".", [:global]),
         plain_text = [protected, ?., payload],
         {:ok, payload} <- Base.url_decode64(payload, padding: false),
         {:ok, signature} <- Base.url_decode64(signature, padding: false) do
      digest_type = hmac_sha2_to_digest_type(protected)
      challenge = :crypto.mac(:hmac, digest_type, key, plain_text)

      if Plug.Crypto.secure_compare(challenge, signature) do
        {:ok, payload}
      else
        :error
      end
    else
      _ ->
        :error
    end
  end
end