1
0
mirror of https://github.com/danog/tgseclib.git synced 2024-12-16 10:57:00 +01:00
tgseclib/phpseclib/Crypt/DSA/Keys/PuTTY.php

127 lines
3.7 KiB
PHP
Raw Normal View History

2016-12-23 17:02:07 +01:00
<?php
/**
* PuTTY Formatted DSA Key Handler
*
* puttygen does not generate DSA keys with an N of anything other than 160, however,
* it can still load them and convert them. PuTTY will load them, too, but SSH servers
* won't accept them. Since PuTTY formatted keys are primarily used with SSH this makes
* keys with N > 160 kinda useless, hence this handlers not supporting such keys.
*
* PHP version 5
*
* @category Crypt
* @package DSA
* @author Jim Wigginton <terrafrost@php.net>
* @copyright 2015 Jim Wigginton
* @license http://www.opensource.org/licenses/mit-license.html MIT License
* @link http://phpseclib.sourceforge.net
*/
namespace phpseclib\Crypt\DSA\Keys;
use phpseclib\Math\BigInteger;
use phpseclib\Common\Functions\Strings;
use phpseclib\Crypt\Common\Keys\PuTTY as Progenitor;
/**
* PuTTY Formatted DSA Key Handler
*
* @package RSA
* @author Jim Wigginton <terrafrost@php.net>
* @access public
*/
abstract class PuTTY extends Progenitor
{
/**
* Public Handler
*
* @var string
* @access private
*/
const PUBLIC_HANDLER = 'phpseclib\Crypt\DSA\Keys\OpenSSH';
/**
* Algorithm Identifier
*
2018-10-25 03:00:37 +02:00
* @var array
2016-12-23 17:02:07 +01:00
* @access private
*/
2018-10-25 03:00:37 +02:00
protected static $types = ['ssh-dss'];
2016-12-23 17:02:07 +01:00
/**
* Break a public or private key down into its constituent components
*
* @access public
* @param string $key
* @param string $password optional
2018-10-25 03:00:37 +02:00
* @return array
2016-12-23 17:02:07 +01:00
*/
public static function load($key, $password = '')
{
$components = parent::load($key, $password);
2018-10-25 03:00:37 +02:00
if (!isset($components['private'])) {
2016-12-23 17:02:07 +01:00
return $components;
}
2018-10-25 03:00:37 +02:00
extract($components);
unset($components['public'], $components['private']);
2016-12-23 17:02:07 +01:00
2018-10-25 03:00:37 +02:00
$result = Strings::unpackSSH2('iiii', $public);
2016-12-23 17:02:07 +01:00
if ($result === false) {
2018-10-25 03:00:37 +02:00
throw new \UnexpectedValueException('Key appears to be malformed');
2016-12-23 17:02:07 +01:00
}
list($p, $q, $g, $y) = $result;
2018-10-25 03:00:37 +02:00
$result = Strings::unpackSSH2('i', $private);
2016-12-23 17:02:07 +01:00
if ($result === false) {
2018-10-25 03:00:37 +02:00
throw new \UnexpectedValueException('Key appears to be malformed');
2016-12-23 17:02:07 +01:00
}
list($x) = $result;
return compact('p', 'q', 'g', 'y', 'x', 'comment');
}
/**
* Convert a private key to the appropriate format.
*
* @access public
* @param \phpseclib\Math\BigInteger $p
* @param \phpseclib\Math\BigInteger $q
* @param \phpseclib\Math\BigInteger $g
* @param \phpseclib\Math\BigInteger $y
* @param \phpseclib\Math\BigInteger $x
* @param string $password optional
* @return string
*/
2018-10-25 03:00:37 +02:00
public static function savePrivateKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y, BigInteger $x, $password = false)
2016-12-23 17:02:07 +01:00
{
if ($q->getLength() != 160) {
throw new \InvalidArgumentException('SSH only supports keys with an N (length of Group Order q) of 160');
}
$public = Strings::packSSH2('iiii', $p, $q, $g, $y);
$private = Strings::packSSH2('i', $x);
2018-10-25 03:00:37 +02:00
return self::wrapPrivateKey($public, $private, 'ssh-dsa', $password);
2016-12-23 17:02:07 +01:00
}
/**
* Convert a public key to the appropriate format
*
* @access public
* @param \phpseclib\Math\BigInteger $p
* @param \phpseclib\Math\BigInteger $q
* @param \phpseclib\Math\BigInteger $g
* @param \phpseclib\Math\BigInteger $y
* @return string
*/
public static function savePublicKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y)
{
if ($q->getLength() != 160) {
throw new \InvalidArgumentException('SSH only supports keys with an N (length of Group Order q) of 160');
}
2018-10-25 03:00:37 +02:00
return self::wrapPublicKey(Strings::packSSH2('iiii', $p, $q, $g, $y), 'ssh-dsa');
2016-12-23 17:02:07 +01:00
}
}