/* * Copyright 2023, Google Inc. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are * met: * * * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above * copyright notice, this list of conditions and the following disclaimer * in the documentation and/or other materials provided with the * distribution. * * * Neither the name of Google Inc. nor the names of its * contributors may be used to endorse or promote products derived from * this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ package com.google.auth.oauth2; import java.security.MessageDigest; import java.security.NoSuchAlgorithmException; import java.security.SecureRandom; import java.util.Base64; /** * Implements PKCE using only the Java standard library. See https://www.rfc-editor.org/rfc/rfc7636. * *

https://developers.google.com/identity/protocols/oauth2/native-app#step1-code-verifier. */ public class DefaultPKCEProvider implements PKCEProvider { private String codeVerifier; private CodeChallenge codeChallenge; private static final int MAX_CODE_VERIFIER_LENGTH = 127; private String createCodeVerifier() { SecureRandom sr = new SecureRandom(); byte[] code = new byte[MAX_CODE_VERIFIER_LENGTH]; sr.nextBytes(code); return Base64.getUrlEncoder().encodeToString(code); } private CodeChallenge createCodeChallenge(String codeVerifier) { return new DefaultPKCEProvider.CodeChallenge(codeVerifier); } public DefaultPKCEProvider() { this.codeVerifier = createCodeVerifier(); this.codeChallenge = createCodeChallenge(this.codeVerifier); } @Override public String getCodeVerifier() { return codeVerifier; } @Override public String getCodeChallenge() { return codeChallenge.getCodeChallenge(); } @Override public String getCodeChallengeMethod() { return codeChallenge.getCodeChallengeMethod(); } /** Class representing the Code Challenge derived from a Code Verifier string. */ private class CodeChallenge { private String codeChallenge; private String codeChallengeMethod; CodeChallenge(String codeVerifier) { try { byte[] bytes = codeVerifier.getBytes(); MessageDigest md = MessageDigest.getInstance("SHA-256"); md.update(bytes); byte[] digest = md.digest(); this.codeChallenge = Base64.getUrlEncoder().encodeToString(digest); this.codeChallengeMethod = "S256"; } catch (NoSuchAlgorithmException e) { this.codeChallenge = codeVerifier; this.codeChallengeMethod = "plain"; } } public String getCodeChallenge() { return codeChallenge; } public String getCodeChallengeMethod() { return codeChallengeMethod; } } }