2017-12-30 11:51:49 -05:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* @file src/Util/Crypto.php
|
|
|
|
*/
|
|
|
|
namespace Friendica\Util;
|
|
|
|
|
2018-06-18 17:05:44 -04:00
|
|
|
use Friendica\Core\Addon;
|
2017-12-30 11:51:49 -05:00
|
|
|
use Friendica\Core\Config;
|
2017-12-30 12:23:45 -05:00
|
|
|
use ASN_BASE;
|
2017-12-30 12:44:43 -05:00
|
|
|
use ASNValue;
|
2017-12-30 11:51:49 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Crypto class
|
|
|
|
*/
|
|
|
|
class Crypto
|
|
|
|
{
|
|
|
|
// supported algorithms are 'sha256', 'sha1'
|
|
|
|
/**
|
|
|
|
* @param string $data data
|
|
|
|
* @param string $key key
|
|
|
|
* @param string $alg algorithm
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public static function rsaSign($data, $key, $alg = 'sha256')
|
|
|
|
{
|
|
|
|
openssl_sign($data, $sig, $key, (($alg == 'sha1') ? OPENSSL_ALGO_SHA1 : $alg));
|
|
|
|
return $sig;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $data data
|
|
|
|
* @param string $sig signature
|
|
|
|
* @param string $key key
|
|
|
|
* @param string $alg algorithm
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public static function rsaVerify($data, $sig, $key, $alg = 'sha256')
|
|
|
|
{
|
|
|
|
return openssl_verify($data, $sig, $key, (($alg == 'sha1') ? OPENSSL_ALGO_SHA1 : $alg));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $Der der formatted string
|
|
|
|
* @param string $Private key type optional, default false
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
private static function DerToPem($Der, $Private = false)
|
|
|
|
{
|
|
|
|
//Encode:
|
|
|
|
$Der = base64_encode($Der);
|
|
|
|
//Split lines:
|
|
|
|
$lines = str_split($Der, 65);
|
|
|
|
$body = implode("\n", $lines);
|
|
|
|
//Get title:
|
|
|
|
$title = $Private ? 'RSA PRIVATE KEY' : 'PUBLIC KEY';
|
|
|
|
//Add wrapping:
|
|
|
|
$result = "-----BEGIN {$title}-----\n";
|
|
|
|
$result .= $body . "\n";
|
|
|
|
$result .= "-----END {$title}-----\n";
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $Der der formatted string
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
private static function DerToRsa($Der)
|
|
|
|
{
|
|
|
|
//Encode:
|
|
|
|
$Der = base64_encode($Der);
|
|
|
|
//Split lines:
|
|
|
|
$lines = str_split($Der, 64);
|
|
|
|
$body = implode("\n", $lines);
|
|
|
|
//Get title:
|
|
|
|
$title = 'RSA PUBLIC KEY';
|
|
|
|
//Add wrapping:
|
|
|
|
$result = "-----BEGIN {$title}-----\n";
|
|
|
|
$result .= $body . "\n";
|
|
|
|
$result .= "-----END {$title}-----\n";
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $Modulus modulo
|
|
|
|
* @param string $PublicExponent exponent
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
private static function pkcs8Encode($Modulus, $PublicExponent)
|
|
|
|
{
|
|
|
|
//Encode key sequence
|
|
|
|
$modulus = new ASNValue(ASNValue::TAG_INTEGER);
|
|
|
|
$modulus->SetIntBuffer($Modulus);
|
|
|
|
$publicExponent = new ASNValue(ASNValue::TAG_INTEGER);
|
|
|
|
$publicExponent->SetIntBuffer($PublicExponent);
|
2018-01-15 08:05:12 -05:00
|
|
|
$keySequenceItems = [$modulus, $publicExponent];
|
2017-12-30 11:51:49 -05:00
|
|
|
$keySequence = new ASNValue(ASNValue::TAG_SEQUENCE);
|
|
|
|
$keySequence->SetSequence($keySequenceItems);
|
|
|
|
//Encode bit string
|
|
|
|
$bitStringValue = $keySequence->Encode();
|
|
|
|
$bitStringValue = chr(0x00) . $bitStringValue; //Add unused bits byte
|
|
|
|
$bitString = new ASNValue(ASNValue::TAG_BITSTRING);
|
|
|
|
$bitString->Value = $bitStringValue;
|
|
|
|
//Encode body
|
|
|
|
$bodyValue = "\x30\x0d\x06\x09\x2a\x86\x48\x86\xf7\x0d\x01\x01\x01\x05\x00" . $bitString->Encode();
|
|
|
|
$body = new ASNValue(ASNValue::TAG_SEQUENCE);
|
|
|
|
$body->Value = $bodyValue;
|
|
|
|
//Get DER encoded public key:
|
|
|
|
$PublicDER = $body->Encode();
|
|
|
|
return $PublicDER;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $Modulus modulo
|
|
|
|
* @param string $PublicExponent exponent
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
private static function pkcs1Encode($Modulus, $PublicExponent)
|
|
|
|
{
|
|
|
|
//Encode key sequence
|
|
|
|
$modulus = new ASNValue(ASNValue::TAG_INTEGER);
|
|
|
|
$modulus->SetIntBuffer($Modulus);
|
|
|
|
$publicExponent = new ASNValue(ASNValue::TAG_INTEGER);
|
|
|
|
$publicExponent->SetIntBuffer($PublicExponent);
|
2018-01-15 08:05:12 -05:00
|
|
|
$keySequenceItems = [$modulus, $publicExponent];
|
2017-12-30 11:51:49 -05:00
|
|
|
$keySequence = new ASNValue(ASNValue::TAG_SEQUENCE);
|
|
|
|
$keySequence->SetSequence($keySequenceItems);
|
|
|
|
//Encode bit string
|
|
|
|
$bitStringValue = $keySequence->Encode();
|
|
|
|
return $bitStringValue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $m modulo
|
|
|
|
* @param string $e exponent
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public static function meToPem($m, $e)
|
|
|
|
{
|
|
|
|
$der = self::pkcs8Encode($m, $e);
|
|
|
|
$key = self::DerToPem($der, false);
|
|
|
|
return $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $key key
|
|
|
|
* @param string $m modulo reference
|
|
|
|
* @param object $e exponent reference
|
|
|
|
* @return void
|
|
|
|
*/
|
|
|
|
private static function pubRsaToMe($key, &$m, &$e)
|
|
|
|
{
|
|
|
|
$lines = explode("\n", $key);
|
|
|
|
unset($lines[0]);
|
|
|
|
unset($lines[count($lines)]);
|
|
|
|
$x = base64_decode(implode('', $lines));
|
|
|
|
|
2017-12-30 12:23:45 -05:00
|
|
|
$r = ASN_BASE::parseASNString($x);
|
2017-12-30 11:51:49 -05:00
|
|
|
|
|
|
|
$m = base64url_decode($r[0]->asnData[0]->asnData);
|
|
|
|
$e = base64url_decode($r[0]->asnData[1]->asnData);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $key key
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public static function rsaToPem($key)
|
|
|
|
{
|
|
|
|
self::pubRsaToMe($key, $m, $e);
|
|
|
|
return self::meToPem($m, $e);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $key key
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
private static function pemToRsa($key)
|
|
|
|
{
|
|
|
|
self::pemToMe($key, $m, $e);
|
|
|
|
return self::meToRsa($m, $e);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $key key
|
|
|
|
* @param string $m modulo reference
|
|
|
|
* @param string $e exponent reference
|
|
|
|
* @return void
|
|
|
|
*/
|
2017-12-31 08:31:06 -05:00
|
|
|
public static function pemToMe($key, &$m, &$e)
|
2017-12-30 11:51:49 -05:00
|
|
|
{
|
|
|
|
$lines = explode("\n", $key);
|
|
|
|
unset($lines[0]);
|
|
|
|
unset($lines[count($lines)]);
|
|
|
|
$x = base64_decode(implode('', $lines));
|
|
|
|
|
2017-12-30 12:23:45 -05:00
|
|
|
$r = ASN_BASE::parseASNString($x);
|
2017-12-30 11:51:49 -05:00
|
|
|
|
|
|
|
$m = base64url_decode($r[0]->asnData[1]->asnData[0]->asnData[0]->asnData);
|
|
|
|
$e = base64url_decode($r[0]->asnData[1]->asnData[0]->asnData[1]->asnData);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $m modulo
|
|
|
|
* @param string $e exponent
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
private static function meToRsa($m, $e)
|
|
|
|
{
|
|
|
|
$der = self::pkcs1Encode($m, $e);
|
|
|
|
$key = self::DerToRsa($der);
|
|
|
|
return $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param integer $bits number of bits
|
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public static function newKeypair($bits)
|
|
|
|
{
|
2018-01-15 08:05:12 -05:00
|
|
|
$openssl_options = [
|
2017-12-30 11:51:49 -05:00
|
|
|
'digest_alg' => 'sha1',
|
|
|
|
'private_key_bits' => $bits,
|
|
|
|
'encrypt_key' => false
|
2018-01-15 08:05:12 -05:00
|
|
|
];
|
2017-12-30 11:51:49 -05:00
|
|
|
|
|
|
|
$conf = Config::get('system', 'openssl_conf_file');
|
|
|
|
if ($conf) {
|
|
|
|
$openssl_options['config'] = $conf;
|
|
|
|
}
|
|
|
|
$result = openssl_pkey_new($openssl_options);
|
|
|
|
|
|
|
|
if (empty($result)) {
|
|
|
|
logger('new_keypair: failed');
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get private key
|
2018-01-15 08:05:12 -05:00
|
|
|
$response = ['prvkey' => '', 'pubkey' => ''];
|
2017-12-30 11:51:49 -05:00
|
|
|
|
|
|
|
openssl_pkey_export($result, $response['prvkey']);
|
|
|
|
|
|
|
|
// Get public key
|
|
|
|
$pkey = openssl_pkey_get_details($result);
|
|
|
|
$response['pubkey'] = $pkey["key"];
|
|
|
|
|
|
|
|
return $response;
|
|
|
|
}
|
2018-06-18 17:05:44 -04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Encrypt a string with 'aes-256-cbc' cipher method.
|
|
|
|
*
|
|
|
|
* @param string $data
|
|
|
|
* @param string $key The key used for encryption.
|
|
|
|
* @param string $iv A non-NULL Initialization Vector.
|
|
|
|
*
|
|
|
|
* @return string|boolean Encrypted string or false on failure.
|
|
|
|
*/
|
|
|
|
private static function encryptAES256CBC($data, $key, $iv)
|
|
|
|
{
|
|
|
|
return openssl_encrypt($data, 'aes-256-cbc', str_pad($key, 32, "\0"), OPENSSL_RAW_DATA, str_pad($iv, 16, "\0"));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decrypt a string with 'aes-256-cbc' cipher method.
|
|
|
|
*
|
|
|
|
* @param string $data
|
|
|
|
* @param string $key The key used for decryption.
|
|
|
|
* @param string $iv A non-NULL Initialization Vector.
|
|
|
|
*
|
|
|
|
* @return string|boolean Decrypted string or false on failure.
|
|
|
|
*/
|
|
|
|
private static function decryptAES256CBC($data, $key, $iv)
|
|
|
|
{
|
|
|
|
return openssl_decrypt($data, 'aes-256-cbc', str_pad($key, 32, "\0"), OPENSSL_RAW_DATA, str_pad($iv, 16, "\0"));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Encrypt a string with 'aes-256-ctr' cipher method.
|
|
|
|
*
|
|
|
|
* @param string $data
|
|
|
|
* @param string $key The key used for encryption.
|
|
|
|
* @param string $iv A non-NULL Initialization Vector.
|
|
|
|
*
|
|
|
|
* @return string|boolean Encrypted string or false on failure.
|
|
|
|
*/
|
|
|
|
private static function encryptAES256CTR($data, $key, $iv)
|
|
|
|
{
|
|
|
|
$key = substr($key, 0, 32);
|
|
|
|
$iv = substr($iv, 0, 16);
|
|
|
|
return openssl_encrypt($data, 'aes-256-ctr', str_pad($key, 32, "\0"), OPENSSL_RAW_DATA, str_pad($iv, 16, "\0"));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decrypt a string with 'aes-256-cbc' cipher method.
|
|
|
|
*
|
|
|
|
* @param string $data
|
|
|
|
* @param string $key The key used for decryption.
|
|
|
|
* @param string $iv A non-NULL Initialization Vector.
|
|
|
|
*
|
|
|
|
* @return string|boolean Decrypted string or false on failure.
|
|
|
|
*/
|
|
|
|
private static function decryptAES256CTR($data, $key, $iv)
|
|
|
|
{
|
|
|
|
$key = substr($key, 0, 32);
|
|
|
|
$iv = substr($iv, 0, 16);
|
|
|
|
return openssl_decrypt($data, 'aes-256-ctr', str_pad($key, 32, "\0"), OPENSSL_RAW_DATA, str_pad($iv, 16, "\0"));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @param string $data
|
|
|
|
* @param string $pubkey The public key.
|
|
|
|
* @param string $alg The algorithm used for encryption.
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public static function encapsulate($data, $pubkey, $alg = 'aes256cbc')
|
|
|
|
{
|
|
|
|
if ($alg === 'aes256cbc') {
|
|
|
|
return self::encapsulateAes($data, $pubkey);
|
|
|
|
}
|
|
|
|
return self::encapsulateOther($data, $pubkey, $alg);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @param type $data
|
|
|
|
* @param type $pubkey The public key.
|
|
|
|
* @param type $alg The algorithm used for encryption.
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
private static function encapsulateOther($data, $pubkey, $alg)
|
|
|
|
{
|
|
|
|
if (!$pubkey) {
|
|
|
|
logger('no key. data: '.$data);
|
|
|
|
}
|
|
|
|
$fn = 'encrypt' . strtoupper($alg);
|
|
|
|
if (method_exists(__CLASS__, $fn)) {
|
|
|
|
// A bit hesitant to use openssl_random_pseudo_bytes() as we know
|
|
|
|
// it has been historically targeted by US agencies for 'weakening'.
|
|
|
|
// It is still arguably better than trying to come up with an
|
|
|
|
// alternative cryptographically secure random generator.
|
|
|
|
// There is little point in using the optional second arg to flag the
|
|
|
|
// assurance of security since it is meaningless if the source algorithms
|
|
|
|
// have been compromised. Also none of this matters if RSA has been
|
|
|
|
// compromised by state actors and evidence is mounting that this has
|
|
|
|
// already happened.
|
|
|
|
$result = ['encrypted' => true];
|
|
|
|
$key = openssl_random_pseudo_bytes(256);
|
|
|
|
$iv = openssl_random_pseudo_bytes(256);
|
|
|
|
$result['data'] = base64url_encode(self::$fn($data, $key, $iv), true);
|
|
|
|
|
|
|
|
// log the offending call so we can track it down
|
|
|
|
if (!openssl_public_encrypt($key, $k, $pubkey)) {
|
|
|
|
$x = debug_backtrace();
|
|
|
|
logger('RSA failed. ' . print_r($x[0], true));
|
|
|
|
}
|
|
|
|
|
|
|
|
$result['alg'] = $alg;
|
|
|
|
$result['key'] = base64url_encode($k, true);
|
|
|
|
openssl_public_encrypt($iv, $i, $pubkey);
|
|
|
|
$result['iv'] = base64url_encode($i, true);
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
} else {
|
|
|
|
$x = ['data' => $data, 'pubkey' => $pubkey, 'alg' => $alg, 'result' => $data];
|
|
|
|
Addon::callHooks('other_encapsulate', $x);
|
|
|
|
|
|
|
|
return $x['result'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @param string $data
|
|
|
|
* @param string $pubkey
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
private static function encapsulateAes($data, $pubkey)
|
|
|
|
{
|
|
|
|
if (!$pubkey) {
|
|
|
|
logger('aes_encapsulate: no key. data: ' . $data);
|
|
|
|
}
|
|
|
|
|
|
|
|
$key = openssl_random_pseudo_bytes(32);
|
|
|
|
$iv = openssl_random_pseudo_bytes(16);
|
|
|
|
$result = ['encrypted' => true];
|
|
|
|
$result['data'] = base64url_encode(AES256CBC_encrypt($data, $key, $iv), true);
|
|
|
|
|
|
|
|
// log the offending call so we can track it down
|
|
|
|
if (!openssl_public_encrypt($key, $k, $pubkey)) {
|
|
|
|
$x = debug_backtrace();
|
|
|
|
logger('aes_encapsulate: RSA failed. ' . print_r($x[0], true));
|
|
|
|
}
|
|
|
|
|
|
|
|
$result['alg'] = 'aes256cbc';
|
|
|
|
$result['key'] = base64url_encode($k, true);
|
|
|
|
openssl_public_encrypt($iv, $i, $pubkey);
|
|
|
|
$result['iv'] = base64url_encode($i, true);
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @param string $data
|
|
|
|
* @param string $prvkey The private key used for decryption.
|
|
|
|
*
|
|
|
|
* @return string|boolean The decrypted string or false on failure.
|
|
|
|
*/
|
|
|
|
public static function unencapsulate($data, $prvkey)
|
|
|
|
{
|
|
|
|
if (!$data) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
$alg = ((array_key_exists('alg', $data)) ? $data['alg'] : 'aes256cbc');
|
|
|
|
if ($alg === 'aes256cbc') {
|
|
|
|
return self::encapsulateAes($data, $prvkey);
|
|
|
|
}
|
|
|
|
return self::encapsulateOther($data, $prvkey, $alg);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @param string $data
|
|
|
|
* @param string $prvkey The private key used for decryption.
|
|
|
|
* @param string $alg
|
|
|
|
*
|
|
|
|
* @return string|boolean The decrypted string or false on failure.
|
|
|
|
*/
|
|
|
|
private static function unencapsulateOther($data, $prvkey, $alg)
|
|
|
|
{
|
|
|
|
$fn = 'decrypt' . strtoupper($alg);
|
|
|
|
|
|
|
|
if (method_exists(__CLASS__, $fn)) {
|
|
|
|
openssl_private_decrypt(base64url_decode($data['key']), $k, $prvkey);
|
|
|
|
openssl_private_decrypt(base64url_decode($data['iv']), $i, $prvkey);
|
|
|
|
|
|
|
|
return self::$fn(base64url_decode($data['data']), $k, $i);
|
|
|
|
} else {
|
|
|
|
$x = ['data' => $data, 'prvkey' => $prvkey, 'alg' => $alg, 'result' => $data];
|
|
|
|
Addon::callHooks('other_unencapsulate', $x);
|
|
|
|
|
|
|
|
return $x['result'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @param array $data
|
|
|
|
* @param string $prvkey The private key used for decryption.
|
|
|
|
*
|
|
|
|
* @return string|boolean The decrypted string or false on failure.
|
|
|
|
*/
|
|
|
|
private static function unencapsulateAes($data, $prvkey)
|
|
|
|
{
|
|
|
|
openssl_private_decrypt(base64url_decode($data['key']), $k, $prvkey);
|
|
|
|
openssl_private_decrypt(base64url_decode($data['iv']), $i, $prvkey);
|
|
|
|
|
|
|
|
return self::decryptAES256CBC(base64url_decode($data['data']), $k, $i);
|
|
|
|
}
|
2017-12-30 11:51:49 -05:00
|
|
|
}
|