与示例JWT相比,HMAC SHA256签名不正确



我试图遵循[RFC for JSON Web Signatures]1,但在遵循示例时遇到了一些问题。

我把所有的东西都整理到最后,在那里我无法生成相同的签名。以下是Python 3.8代码示例:

import hmac
import hashlib
import base64
signing_input = b"eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ"
key = b"AyM1SysPpbyDfgZld3umj1qzKObwVMkoqQ-EstJQLr_T-1qS0gZH75aKtMN3Yj0iPS4hcgUuTwjAzZr1Z9CAow"
signature = hmac.digest(key, signing_input, digest=hashlib.sha256)
print(base64.urlsafe_b64encode(signature))
# Output: b'ZekyXWlxvuCN9H8cuDrZfaRa3pMJhHpv6QKFdUqXbLc='
# Expected: b'dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk'

此外,我还尝试了一些处理HMAC-SHA256的在线工具,但我得到了与Python脚本相同的输出。你知道我哪里错了吗?[1] :https://www.rfc-editor.org/rfc/rfc7515#appendix-A.1

您使用了错误的键。RFC使用JSON Web算法"oct"以JSON Web密钥格式显示密钥。这意味着密钥是一个base64url编码的字节序列。如果您希望结果匹配,则需要在使用它之前对其进行解码。

请注意,python的urlsafe_b64decodeurlsafe_b64encode并没有完全实现JWT和朋友们使用的base64url编码。python函数期望/生成填充字符,JWT指定的base64url编码应该删除这些填充字符。

把这些放在一起:

import hmac
import hashlib
import base64
signing_input = b"eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ"
key = b"AyM1SysPpbyDfgZld3umj1qzKObwVMkoqQ-EstJQLr_T-1qS0gZH75aKtMN3Yj0iPS4hcgUuTwjAzZr1Z9CAow"
# Decode the key.  Pad it with '=' characters to a length divisible by 4 
# as expected by urlsafe_b64decode
if len(key) % 4 == 2:
key += b'=='
elif len(key) % 4 == 3:
key += b'='
key = base64.urlsafe_b64decode(key)
signature = hmac.digest(key, signing_input, digest=hashlib.sha256)
signature = base64.urlsafe_b64encode(signature)
# Strip off any '=' characters urlsafe_b64encode added to pad the key to
# a length divisible by 4
signature = signature.rstrip(b'=')
print(signature)
# Prints: b'dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk'

最新更新