mirror of
https://github.com/danog/tgseclib.git
synced 2024-12-04 02:27:52 +01:00
493 lines
12 KiB
PHP
493 lines
12 KiB
PHP
<?php
|
|
|
|
/**
|
|
* Base Class for all asymmetric key ciphers
|
|
*
|
|
* PHP version 5
|
|
*
|
|
* @category Crypt
|
|
* @package AsymmetricKey
|
|
* @author Jim Wigginton <terrafrost@php.net>
|
|
* @copyright 2016 Jim Wigginton
|
|
* @license http://www.opensource.org/licenses/mit-license.html MIT License
|
|
* @link http://phpseclib.sourceforge.net
|
|
*/
|
|
|
|
namespace phpseclib\Crypt\Common;
|
|
|
|
use phpseclib\Exception\UnsupportedFormatException;
|
|
use phpseclib\Exception\NoKeyLoadedException;
|
|
use phpseclib\Math\BigInteger;
|
|
use phpseclib\Crypt\Hash;
|
|
use phpseclib\Crypt\RSA;
|
|
use phpseclib\Crypt\DSA;
|
|
use phpseclib\Crypt\ECDSA;
|
|
|
|
/**
|
|
* Base Class for all stream cipher classes
|
|
*
|
|
* @package AsymmetricKey
|
|
* @author Jim Wigginton <terrafrost@php.net>
|
|
*/
|
|
abstract class AsymmetricKey
|
|
{
|
|
/**
|
|
* Precomputed Zero
|
|
*
|
|
* @var \phpseclib\Math\BigInteger
|
|
* @access private
|
|
*/
|
|
protected static $zero;
|
|
|
|
/**
|
|
* Precomputed One
|
|
*
|
|
* @var \phpseclib\Math\BigInteger
|
|
* @access private
|
|
*/
|
|
protected static $one;
|
|
|
|
/**
|
|
* Format of the loaded key
|
|
*
|
|
* @var string
|
|
* @access private
|
|
*/
|
|
protected $format;
|
|
|
|
/**
|
|
* Hash function
|
|
*
|
|
* @var \phpseclib\Crypt\Hash
|
|
* @access private
|
|
*/
|
|
protected $hash;
|
|
|
|
/**
|
|
* HMAC function
|
|
*
|
|
* @var \phpseclib\Crypt\Hash
|
|
* @access private
|
|
*/
|
|
private $hmac;
|
|
|
|
/**
|
|
* Supported plugins (lower case)
|
|
*
|
|
* @see self::initialize_static_variables()
|
|
* @var array
|
|
* @access private
|
|
*/
|
|
private static $plugins = [];
|
|
|
|
/**
|
|
* Invisible plugins
|
|
*
|
|
* @see self::initialize_static_variables()
|
|
* @var array
|
|
* @access private
|
|
*/
|
|
private static $invisiblePlugins = [];
|
|
|
|
/**
|
|
* Supported signature formats (lower case)
|
|
*
|
|
* @see self::initialize_static_variables()
|
|
* @var array
|
|
* @access private
|
|
*/
|
|
private static $signatureFormats = [];
|
|
|
|
/**
|
|
* Supported signature formats (original case)
|
|
*
|
|
* @see self::initialize_static_variables()
|
|
* @var array
|
|
* @access private
|
|
*/
|
|
private static $signatureFileFormats = [];
|
|
|
|
/**
|
|
* Available Engines
|
|
*
|
|
* @var boolean[]
|
|
* @access private
|
|
*/
|
|
protected static $engines = [];
|
|
|
|
/**
|
|
* The constructor
|
|
*/
|
|
protected function __construct()
|
|
{
|
|
self::initialize_static_variables();
|
|
|
|
$this->hash = new Hash('sha256');
|
|
$this->hmac = new Hash('sha256');
|
|
}
|
|
|
|
/**
|
|
* Initialize static variables
|
|
*/
|
|
protected static function initialize_static_variables()
|
|
{
|
|
if (!isset(self::$zero)) {
|
|
self::$zero= new BigInteger(0);
|
|
self::$one = new BigInteger(1);
|
|
}
|
|
|
|
self::loadPlugins('Keys');
|
|
if (static::ALGORITHM != 'RSA' && static::ALGORITHM != 'DH') {
|
|
self::loadPlugins('Signature');
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Load the key
|
|
*
|
|
* @param string $key
|
|
* @param string $password optional
|
|
* @return AsymmetricKey
|
|
*/
|
|
public static function load($key, $password = false)
|
|
{
|
|
self::initialize_static_variables();
|
|
|
|
$components = false;
|
|
foreach (self::$plugins[static::ALGORITHM]['Keys'] as $format) {
|
|
if (isset(self::$invisiblePlugins[static::ALGORITHM]) && in_array($format, self::$invisiblePlugins[static::ALGORITHM])) {
|
|
continue;
|
|
}
|
|
try {
|
|
$components = $format::load($key, $password);
|
|
} catch (\Exception $e) {
|
|
$components = false;
|
|
}
|
|
if ($components !== false) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
if ($components === false) {
|
|
throw new NoKeyLoadedException('Unable to read key');
|
|
}
|
|
|
|
$components['format'] = $format;
|
|
|
|
$new = static::onLoad($components);
|
|
return $new instanceof PrivateKey ?
|
|
$new->withPassword($password) :
|
|
$new;
|
|
}
|
|
|
|
/**
|
|
* Load the key, assuming a specific format
|
|
*
|
|
* @param string $key
|
|
* @param string $type
|
|
* @param string $password optional
|
|
* @return AsymmetricKey
|
|
*/
|
|
public static function loadFormat($type, $key, $password = false)
|
|
{
|
|
self::initialize_static_variables();
|
|
|
|
$components = false;
|
|
$format = strtolower($type);
|
|
if (isset(self::$plugins[static::ALGORITHM]['Keys'][$format])) {
|
|
$format = self::$plugins[static::ALGORITHM]['Keys'][$format];
|
|
$components = $format::load($key, $password);
|
|
}
|
|
|
|
if ($components === false) {
|
|
throw new NoKeyLoadedException('Unable to read key');
|
|
}
|
|
|
|
$components['format'] = $format;
|
|
|
|
$new = static::onLoad($components);
|
|
return $new instanceof PrivateKey ?
|
|
$new->withPassword($password) :
|
|
$new;
|
|
}
|
|
|
|
/**
|
|
* Validate Plugin
|
|
*
|
|
* @access private
|
|
* @param string $format
|
|
* @param string $type
|
|
* @param string $method optional
|
|
* @return mixed
|
|
*/
|
|
protected static function validatePlugin($format, $type, $method = NULL)
|
|
{
|
|
$type = strtolower($type);
|
|
if (!isset(self::$plugins[static::ALGORITHM][$format][$type])) {
|
|
throw new UnsupportedFormatException("$type is not a supported format");
|
|
}
|
|
$type = self::$plugins[static::ALGORITHM][$format][$type];
|
|
if (isset($method) && !method_exists($type, $method)) {
|
|
throw new UnsupportedFormatException("$type does not implement $method");
|
|
}
|
|
|
|
return $type;
|
|
}
|
|
|
|
/**
|
|
* Load Plugins
|
|
*
|
|
* @access private
|
|
* @param $format
|
|
*/
|
|
private static function loadPlugins($format)
|
|
{
|
|
if (!isset(self::$plugins[static::ALGORITHM][$format])) {
|
|
self::$plugins[static::ALGORITHM][$format] = [];
|
|
foreach (new \DirectoryIterator(__DIR__ . '/../' . static::ALGORITHM . '/Formats/' . $format . '/') as $file) {
|
|
if ($file->getExtension() != 'php') {
|
|
continue;
|
|
}
|
|
$name = $file->getBasename('.php');
|
|
$type = 'phpseclib\Crypt\\' . static::ALGORITHM . '\\Formats\\' . $format . '\\' . $name;
|
|
$reflect = new \ReflectionClass($type);
|
|
if ($reflect->isTrait()) {
|
|
continue;
|
|
}
|
|
self::$plugins[static::ALGORITHM][$format][strtolower($name)] = $type;
|
|
if ($reflect->hasConstant('IS_INVISIBLE')) {
|
|
self::$invisiblePlugins[static::ALGORITHM][] = $type;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Returns a list of supported formats.
|
|
*
|
|
* @access public
|
|
* @return array
|
|
*/
|
|
public static function getSupportedKeyFormats()
|
|
{
|
|
self::initialize_static_variables();
|
|
|
|
return self::$plugins[static::ALGORITHM]['Keys'];
|
|
}
|
|
|
|
/**
|
|
* Add a fileformat plugin
|
|
*
|
|
* The plugin needs to either already be loaded or be auto-loadable.
|
|
* Loading a plugin whose shortname overwrite an existing shortname will overwrite the old plugin.
|
|
*
|
|
* @see self::load()
|
|
* @param string $fullname
|
|
* @access public
|
|
* @return bool
|
|
*/
|
|
public static function addFileFormat($fullname)
|
|
{
|
|
self::initialize_static_variables();
|
|
|
|
if (class_exists($fullname)) {
|
|
$meta = new \ReflectionClass($fullname);
|
|
$shortname = $meta->getShortName();
|
|
self::$plugins[static::ALGORITHM]['Keys'][strtolower($shortname)] = $fullname;
|
|
if ($meta->hasConstant('IS_INVISIBLE')) {
|
|
self::$invisiblePlugins[static::ALGORITHM] = strtolower($name);
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Returns the format of the loaded key.
|
|
*
|
|
* If the key that was loaded wasn't in a valid or if the key was auto-generated
|
|
* with RSA::createKey() then this will return false.
|
|
*
|
|
* @see self::load()
|
|
* @access public
|
|
* @return mixed
|
|
*/
|
|
public function getLoadedFormat()
|
|
{
|
|
if ($this->format === false) {
|
|
return false;
|
|
}
|
|
|
|
$meta = new \ReflectionClass($this->format);
|
|
return $meta->getShortName();
|
|
}
|
|
|
|
/**
|
|
* Tests engine validity
|
|
*
|
|
* @access public
|
|
* @param int $val
|
|
*/
|
|
public static function useBestEngine()
|
|
{
|
|
static::$engines = [
|
|
'PHP' => true,
|
|
'OpenSSL' => extension_loaded('openssl'),
|
|
// this test can be satisfied by either of the following:
|
|
// http://php.net/manual/en/book.sodium.php
|
|
// https://github.com/paragonie/sodium_compat
|
|
'libsodium' => function_exists('sodium_crypto_sign_keypair')
|
|
];
|
|
|
|
return static::$engines;
|
|
}
|
|
|
|
/**
|
|
* Flag to use internal engine only (useful for unit testing)
|
|
*
|
|
* @access public
|
|
*/
|
|
public static function useInternalEngine()
|
|
{
|
|
static::$engines = [
|
|
'PHP' => true,
|
|
'OpenSSL' => false,
|
|
'libsodium' => false
|
|
];
|
|
}
|
|
|
|
/**
|
|
* __toString() magic method
|
|
*
|
|
* @return string
|
|
*/
|
|
public function __toString()
|
|
{
|
|
return $this->toString('PKCS8');
|
|
}
|
|
|
|
/**
|
|
* Determines which hashing function should be used
|
|
*
|
|
* @access public
|
|
* @param string $hash
|
|
*/
|
|
public function withHash($hash)
|
|
{
|
|
$new = clone $this;
|
|
|
|
$new->hash = new Hash($hash);
|
|
$new->hmac = new Hash($hash);
|
|
|
|
return $new;
|
|
}
|
|
|
|
/**
|
|
* Returns the hash algorithm currently being used
|
|
*
|
|
* @access public
|
|
*/
|
|
public function getHash()
|
|
{
|
|
return $this->hash->getHash();
|
|
}
|
|
|
|
/**
|
|
* Compute the pseudorandom k for signature generation,
|
|
* using the process specified for deterministic DSA.
|
|
*
|
|
* @access public
|
|
* @param string $h1
|
|
* @return string
|
|
*/
|
|
protected function computek($h1)
|
|
{
|
|
$v = str_repeat("\1", strlen($h1));
|
|
|
|
$k = str_repeat("\0", strlen($h1));
|
|
|
|
$x = $this->int2octets($this->x);
|
|
$h1 = $this->bits2octets($h1);
|
|
|
|
$this->hmac->setKey($k);
|
|
$k = $this->hmac->hash($v . "\0" . $x . $h1);
|
|
$this->hmac->setKey($k);
|
|
$v = $this->hmac->hash($v);
|
|
$k = $this->hmac->hash($v . "\1" . $x . $h1);
|
|
$this->hmac->setKey($k);
|
|
$v = $this->hmac->hash($v);
|
|
|
|
$qlen = $this->q->getLengthInBytes();
|
|
|
|
while (true) {
|
|
$t = '';
|
|
while (strlen($t) < $qlen) {
|
|
$v = $this->hmac->hash($v);
|
|
$t = $t . $v;
|
|
}
|
|
$k = $this->bits2int($t);
|
|
|
|
if (!$k->equals(self::$zero) && $k->compare($this->q) < 0) {
|
|
break;
|
|
}
|
|
$k = $this->hmac->hash($v . "\0");
|
|
$this->hmac->setKey($k);
|
|
$v = $this->hmac->hash($v);
|
|
}
|
|
|
|
return $k;
|
|
}
|
|
|
|
/**
|
|
* Integer to Octet String
|
|
*
|
|
* @access private
|
|
* @param \phpseclib\Math\BigInteger $v
|
|
* @return string
|
|
*/
|
|
private function int2octets($v)
|
|
{
|
|
$out = $v->toBytes();
|
|
$rolen = $this->q->getLengthInBytes();
|
|
if (strlen($out) < $rolen) {
|
|
return str_pad($out, $rolen, "\0", STR_PAD_LEFT);
|
|
} else if (strlen($out) > $rolen) {
|
|
return substr($out, -$rolen);
|
|
} else {
|
|
return $out;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Bit String to Integer
|
|
*
|
|
* @access private
|
|
* @param string $in
|
|
* @return \phpseclib\Math\BigInteger
|
|
*/
|
|
protected function bits2int($in)
|
|
{
|
|
$v = new BigInteger($in, 256);
|
|
$vlen = strlen($in) << 3;
|
|
$qlen = $this->q->getLength();
|
|
if ($vlen > $qlen) {
|
|
return $v->bitwise_rightShift($vlen - $qlen);
|
|
}
|
|
return $v;
|
|
}
|
|
|
|
/**
|
|
* Bit String to Octet String
|
|
*
|
|
* @access private
|
|
* @param string $in
|
|
* @return string
|
|
*/
|
|
private function bits2octets($in)
|
|
{
|
|
$z1 = $this->bits2int($in);
|
|
$z2 = $z1->subtract($this->q);
|
|
return $z2->compare(self::$zero) < 0 ?
|
|
$this->int2octets($z1) :
|
|
$this->int2octets($z2);
|
|
}
|
|
}
|