I am working on an android application for on online taxi service , in which it supports in app calling using sinch SDK. To authorize a client, we need to share our APP_KEY and SECRET_KEY and userId with the sinch server and that's cryptographically signed with the Application Secret. From their tutorial they have made a class to share these data as base 64 . But once I tried this I got a runtime exception as "bad base-64" like:
E/AndroidRuntime: FATAL EXCEPTION: main
Process: com.tukxi.ride, PID: 17870
java.lang.RuntimeException: bad base-64
at com.general.files.JWT.create(JWT.java:50)
at com.general.files.SinchService$MySinchClientListener.onCredentialsRequired(SinchService.java:252)
at com.sinch.android.rtc.internal.client.DefaultSinchClient$2.onCredentialsRequired(Unknown Source:22)
here is my code :
public static String create(String appKey, String appSecret, String userId) {
JSONObject header = new JSONObject();
JSONObject payload = new JSONObject();
final long issuedAt = System.currentTimeMillis() / 1000;
String kid = "hkdfv1-" + formatDate(issuedAt);
try {
header.put("alg", "HS256");
header.put("typ", "JWT");
header.put("kid", kid);
payload.put("iss","//rtc.sinch.com/applications/" + appKey);
payload.put("sub","//rtc.sinch.com/applications/" + appKey + "/users/" + userId);
payload.put("iat",issuedAt);
payload.put("exp",issuedAt + 600);
payload.put("nonce", UUID.randomUUID());
} catch (JSONException e) {
throw new RuntimeException(e.getMessage(), e.getCause());
}
String headerStr = header.toString().trim().replace("\\/","/");
String payloadStr = payload.toString().trim().replace("\\/","/");
String headerBase64 = Base64.encodeToString(headerStr.getBytes(), Base64.NO_PADDING | Base64.NO_WRAP | Base64.DEFAULT);
String payloadBase64 = Base64.encodeToString(payloadStr.getBytes(), Base64.NO_PADDING | Base64.NO_WRAP | Base64.DEFAULT);
String jwtToSign = headerBase64 + "." + payloadBase64;
String jwtSignature;
try {
byte[] origKey = Base64.decode(appSecret, Base64.DEFAULT);
byte[] signingKey = deriveSigningKey(origKey, issuedAt);
final byte[] macData = Hmac.hmacSha256(signingKey, jwtToSign);
String signature = Base64.encodeToString(macData, Base64.NO_PADDING | Base64.NO_WRAP | Base64.DEFAULT);
jwtSignature = jwtToSign + "." + signature;
} catch (Exception e) {
throw new RuntimeException(e.getMessage(), e.getCause());
}
return jwtSignature;
}
private static String formatDate(long time) {
String format = "yyyyMMdd";
SimpleDateFormat sdf = new SimpleDateFormat(format, Locale.getDefault());
sdf.setTimeZone(TimeZone.getDefault());
return sdf.format(new Date(time * 1000));
}
private static byte[] deriveSigningKey(byte[] key, long issuedAt) {
return Hmac.hmacSha256(key, formatDate(issuedAt));
}