2015-08-23 22:38:18 +02:00
|
|
|
<?php /** @file */
|
|
|
|
|
|
|
|
require_once('library/ASNValue.class.php');
|
|
|
|
require_once('library/asn1.php');
|
|
|
|
|
|
|
|
function rsa_sign($data,$key,$alg = 'sha256') {
|
|
|
|
if(! $key)
|
|
|
|
return 'no key';
|
|
|
|
$sig = '';
|
|
|
|
if(intval(OPENSSL_ALGO_SHA256) && $alg === 'sha256')
|
|
|
|
$alg = OPENSSL_ALGO_SHA256;
|
|
|
|
openssl_sign($data,$sig,$key,$alg);
|
|
|
|
return $sig;
|
|
|
|
}
|
|
|
|
|
|
|
|
function rsa_verify($data,$sig,$key,$alg = 'sha256') {
|
|
|
|
|
|
|
|
if(! $key)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if(intval(OPENSSL_ALGO_SHA256) && $alg === 'sha256')
|
|
|
|
$alg = OPENSSL_ALGO_SHA256;
|
2016-03-20 08:06:33 +01:00
|
|
|
$verify = @openssl_verify($data,$sig,$key,$alg);
|
|
|
|
|
|
|
|
if(! $verify) {
|
|
|
|
while($msg = openssl_error_string())
|
|
|
|
logger('openssl_verify: ' . $msg,LOGGER_NORMAL,LOG_ERR);
|
2016-04-17 16:29:18 +02:00
|
|
|
btlogger('openssl_verify: key: ' . $key, LOGGER_DEBUG, LOG_ERR);
|
2016-03-20 08:06:33 +01:00
|
|
|
}
|
|
|
|
|
2015-08-23 22:38:18 +02:00
|
|
|
return $verify;
|
|
|
|
}
|
|
|
|
|
|
|
|
function pkcs5_pad ($text, $blocksize)
|
|
|
|
{
|
|
|
|
$pad = $blocksize - (strlen($text) % $blocksize);
|
|
|
|
return $text . str_repeat(chr($pad), $pad);
|
|
|
|
}
|
|
|
|
|
|
|
|
function pkcs5_unpad($text)
|
|
|
|
{
|
|
|
|
$pad = ord($text{strlen($text)-1});
|
|
|
|
if ($pad > strlen($text)) return false;
|
|
|
|
if (strspn($text, chr($pad), strlen($text) - $pad) != $pad) return false;
|
|
|
|
return substr($text, 0, -1 * $pad);
|
|
|
|
}
|
|
|
|
|
|
|
|
function AES256CBC_encrypt($data,$key,$iv) {
|
2016-06-22 19:56:29 +02:00
|
|
|
|
|
|
|
return openssl_encrypt($data,'aes-256-cbc',str_pad($key,32,"\0"),OPENSSL_RAW_DATA,str_pad($iv,16,"\0"));
|
2015-08-23 22:38:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
function AES256CBC_decrypt($data,$key,$iv) {
|
2016-06-22 19:56:29 +02:00
|
|
|
|
|
|
|
return openssl_decrypt($data,'aes-256-cbc',str_pad($key,32,"\0"),OPENSSL_RAW_DATA,str_pad($iv,16,"\0"));
|
2017-02-05 16:11:01 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
function AES128CBC_encrypt($data,$key,$iv) {
|
|
|
|
$key = substr($key,0,16);
|
|
|
|
$iv = substr($iv,0,16);
|
|
|
|
return openssl_encrypt($data,'aes-128-cbc',str_pad($key,16,"\0"),OPENSSL_RAW_DATA,str_pad($iv,16,"\0"));
|
|
|
|
}
|
|
|
|
|
|
|
|
function AES128CBC_decrypt($data,$key,$iv) {
|
|
|
|
$key = substr($key,0,16);
|
|
|
|
$iv = substr($iv,0,16);
|
|
|
|
return openssl_decrypt($data,'aes-128-cbc',str_pad($key,16,"\0"),OPENSSL_RAW_DATA,str_pad($iv,16,"\0"));
|
|
|
|
}
|
|
|
|
|
|
|
|
function STD_encrypt($data,$key,$iv) {
|
|
|
|
$key = substr($key,0,32);
|
|
|
|
$iv = substr($iv,0,16);
|
|
|
|
return openssl_encrypt($data,'aes-256-cbc',str_pad($key,32,"\0"),OPENSSL_RAW_DATA,str_pad($iv,16,"\0"));
|
|
|
|
}
|
|
|
|
|
|
|
|
function STD_decrypt($data,$key,$iv) {
|
|
|
|
$key = substr($key,0,32);
|
|
|
|
$iv = substr($iv,0,16);
|
|
|
|
return openssl_decrypt($data,'aes-256-cbc',str_pad($key,32,"\0"),OPENSSL_RAW_DATA,str_pad($iv,16,"\0"));
|
|
|
|
}
|
2016-06-22 19:56:29 +02:00
|
|
|
|
2017-02-05 16:11:01 +01:00
|
|
|
function CAST5CBC_encrypt($data,$key,$iv) {
|
|
|
|
$key = substr($key,0,16);
|
|
|
|
$iv = substr($iv,0,8);
|
|
|
|
return openssl_encrypt($data,'cast5-cbc',str_pad($key,16,"\0"),OPENSSL_RAW_DATA,str_pad($iv,8,"\0"));
|
|
|
|
}
|
|
|
|
|
|
|
|
function CAST5CBC_decrypt($data,$key,$iv) {
|
|
|
|
$key = substr($key,0,16);
|
|
|
|
$iv = substr($iv,0,8);
|
|
|
|
return openssl_decrypt($data,'cast5-cbc',str_pad($key,16,"\0"),OPENSSL_RAW_DATA,str_pad($iv,8,"\0"));
|
2015-08-23 22:38:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
function crypto_encapsulate($data,$pubkey,$alg='aes256cbc') {
|
2017-02-05 16:11:01 +01:00
|
|
|
$fn = strtoupper($alg) . '_encrypt';
|
|
|
|
|
2015-08-23 22:38:18 +02:00
|
|
|
if($alg === 'aes256cbc')
|
|
|
|
return aes_encapsulate($data,$pubkey);
|
|
|
|
|
2017-02-05 16:11:01 +01:00
|
|
|
return other_encapsulate($data,$pubkey,$alg);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
function other_encapsulate($data,$pubkey,$alg) {
|
|
|
|
if(! $pubkey)
|
|
|
|
logger('no key. data: ' . $data);
|
|
|
|
|
|
|
|
$fn = strtoupper($alg) . '_encrypt';
|
|
|
|
if(function_exists($fn)) {
|
|
|
|
|
|
|
|
// A bit hesitant to use openssl_random_pseudo_bytes() as we know
|
|
|
|
// it has been historically targeted by US agencies for 'weakening'.
|
|
|
|
// It is still arguably better than trying to come up with an
|
|
|
|
// alternative cryptographically secure random generator.
|
|
|
|
// There is little point in using the optional second arg to flag the
|
|
|
|
// assurance of security since it is meaningless if the source algorithms
|
|
|
|
// have been compromised. Also none of this matters if RSA has been
|
|
|
|
// compromised by state actors and evidence is mounting that this has
|
|
|
|
// already happened.
|
|
|
|
|
|
|
|
$key = openssl_random_pseudo_bytes(256);
|
|
|
|
$iv = openssl_random_pseudo_bytes(256);
|
|
|
|
$result['data'] = base64url_encode($fn($data,$key,$iv),true);
|
|
|
|
// log the offending call so we can track it down
|
|
|
|
if(! openssl_public_encrypt($key,$k,$pubkey)) {
|
|
|
|
$x = debug_backtrace();
|
|
|
|
logger('RSA failed. ' . print_r($x[0],true));
|
|
|
|
}
|
|
|
|
|
|
|
|
$result['alg'] = $alg;
|
|
|
|
$result['key'] = base64url_encode($k,true);
|
|
|
|
openssl_public_encrypt($iv,$i,$pubkey);
|
|
|
|
$result['iv'] = base64url_encode($i,true);
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$x = [ 'data' => $data, 'pubkey' => $pubkey, 'alg' => $alg, 'result' => $data ];
|
|
|
|
call_hooks('other_encapsulate', $x);
|
|
|
|
return $x['result'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function crypto_methods() {
|
|
|
|
|
|
|
|
if(\Zotlabs\Lib\System::get_server_role() !== 'pro')
|
|
|
|
return [ 'aes256cbc' ];
|
|
|
|
|
|
|
|
// 'std' is the new project standard which is aes256cbc but transmits/receives 256-byte key and iv.
|
|
|
|
// aes256cbc is provided for compatibility with earlier zot implementations which assume 32-byte key and 16-byte iv.
|
|
|
|
// other_encapsulate() now produces these longer keys/ivs by default so that it is difficult to guess a
|
|
|
|
// particular implementation or choice of underlying implementations based on the key/iv length.
|
|
|
|
// The actual methods are responsible for deriving the actual key/iv from the provided parameters;
|
|
|
|
// possibly by truncation or segmentation - though many other methods could be used.
|
|
|
|
|
|
|
|
$r = [ 'std', 'aes256cbc', 'aes128cbc', 'cast5cbc' ];
|
|
|
|
call_hooks('crypto_methods',$r);
|
|
|
|
return $r;
|
|
|
|
|
2015-08-23 22:38:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
function aes_encapsulate($data,$pubkey) {
|
|
|
|
if(! $pubkey)
|
|
|
|
logger('aes_encapsulate: no key. data: ' . $data);
|
2017-02-05 16:11:01 +01:00
|
|
|
$key = openssl_random_pseudo_bytes(32);
|
|
|
|
$iv = openssl_random_pseudo_bytes(16);
|
2015-08-23 22:38:18 +02:00
|
|
|
$result['data'] = base64url_encode(AES256CBC_encrypt($data,$key,$iv),true);
|
|
|
|
// log the offending call so we can track it down
|
|
|
|
if(! openssl_public_encrypt($key,$k,$pubkey)) {
|
|
|
|
$x = debug_backtrace();
|
|
|
|
logger('aes_encapsulate: RSA failed. ' . print_r($x[0],true));
|
|
|
|
}
|
|
|
|
$result['alg'] = 'aes256cbc';
|
|
|
|
$result['key'] = base64url_encode($k,true);
|
|
|
|
openssl_public_encrypt($iv,$i,$pubkey);
|
|
|
|
$result['iv'] = base64url_encode($i,true);
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
function crypto_unencapsulate($data,$prvkey) {
|
|
|
|
if(! $data)
|
|
|
|
return;
|
|
|
|
$alg = ((array_key_exists('alg',$data)) ? $data['alg'] : 'aes256cbc');
|
|
|
|
if($alg === 'aes256cbc')
|
|
|
|
return aes_unencapsulate($data,$prvkey);
|
|
|
|
|
2017-02-05 16:11:01 +01:00
|
|
|
return other_unencapsulate($data,$prvkey,$alg);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
function other_unencapsulate($data,$prvkey,$alg) {
|
|
|
|
$fn = strtoupper($alg) . '_decrypt';
|
|
|
|
if(function_exists($fn)) {
|
|
|
|
openssl_private_decrypt(base64url_decode($data['key']),$k,$prvkey);
|
|
|
|
openssl_private_decrypt(base64url_decode($data['iv']),$i,$prvkey);
|
|
|
|
return $fn(base64url_decode($data['data']),$k,$i);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$x = [ 'data' => $data, 'prvkey' => $prvkey, 'alg' => $alg, 'result' => $data ];
|
|
|
|
call_hooks('other_unencapsulate',$x);
|
|
|
|
return $x['result'];
|
|
|
|
}
|
2015-08-23 22:38:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
function aes_unencapsulate($data,$prvkey) {
|
|
|
|
openssl_private_decrypt(base64url_decode($data['key']),$k,$prvkey);
|
|
|
|
openssl_private_decrypt(base64url_decode($data['iv']),$i,$prvkey);
|
|
|
|
return AES256CBC_decrypt(base64url_decode($data['data']),$k,$i);
|
|
|
|
}
|
|
|
|
|
|
|
|
function new_keypair($bits) {
|
|
|
|
|
|
|
|
$openssl_options = array(
|
|
|
|
'digest_alg' => 'sha1',
|
|
|
|
'private_key_bits' => $bits,
|
|
|
|
'encrypt_key' => false
|
|
|
|
);
|
|
|
|
|
|
|
|
$conf = get_config('system','openssl_conf_file');
|
|
|
|
if($conf)
|
|
|
|
$openssl_options['config'] = $conf;
|
|
|
|
|
|
|
|
$result = openssl_pkey_new($openssl_options);
|
|
|
|
|
|
|
|
if(empty($result)) {
|
|
|
|
logger('new_keypair: failed');
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get private key
|
|
|
|
|
|
|
|
$response = array('prvkey' => '', 'pubkey' => '');
|
|
|
|
|
|
|
|
openssl_pkey_export($result, $response['prvkey']);
|
|
|
|
|
|
|
|
// Get public key
|
|
|
|
$pkey = openssl_pkey_get_details($result);
|
|
|
|
$response['pubkey'] = $pkey["key"];
|
|
|
|
|
|
|
|
return $response;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
function pkcs1to8($oldkey,$len) {
|
|
|
|
|
|
|
|
if($len == 4096)
|
|
|
|
$c = 'g';
|
|
|
|
if($len == 2048)
|
|
|
|
$c = 'Q';
|
|
|
|
|
|
|
|
if(strstr($oldkey,'BEGIN PUBLIC'))
|
|
|
|
return $oldkey;
|
|
|
|
|
|
|
|
$oldkey = str_replace('-----BEGIN RSA PUBLIC KEY-----', '', $oldkey);
|
|
|
|
$oldkey = trim(str_replace('-----END RSA PUBLIC KEY-----', '', $oldkey));
|
|
|
|
$key = 'MIICIjANBgkqhkiG9w0BAQEFAAOCA' . $c . '8A' . str_replace("\n", '', $oldkey);
|
|
|
|
$key = "-----BEGIN PUBLIC KEY-----\n" . wordwrap($key, 64, "\n", true) . "\n-----END PUBLIC KEY-----";
|
|
|
|
return $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
function pkcs8to1($oldkey,$len) {
|
|
|
|
|
|
|
|
if(strstr($oldkey,'BEGIN RSA'))
|
|
|
|
return $oldkey;
|
|
|
|
|
|
|
|
$oldkey = str_replace('-----BEGIN PUBLIC KEY-----', '', $oldkey);
|
|
|
|
$oldkey = trim(str_replace('-----END PUBLIC KEY-----', '', $oldkey));
|
|
|
|
$key = str_replace("\n",'',$oldkey);
|
|
|
|
$key = substr($key,32);
|
|
|
|
$key = "-----BEGIN RSA PUBLIC KEY-----\n" . wordwrap($key, 64, "\n", true) . "\n-----END RSA PUBLIC KEY-----";
|
|
|
|
return $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
function DerToPem($Der, $Private=false)
|
|
|
|
{
|
|
|
|
//Encode:
|
|
|
|
$Der = base64_encode($Der);
|
|
|
|
//Split lines:
|
|
|
|
$lines = str_split($Der, 65);
|
|
|
|
$body = implode("\n", $lines);
|
|
|
|
//Get title:
|
|
|
|
$title = $Private? 'RSA PRIVATE KEY' : 'PUBLIC KEY';
|
|
|
|
//Add wrapping:
|
|
|
|
$result = "-----BEGIN {$title}-----\n";
|
|
|
|
$result .= $body . "\n";
|
|
|
|
$result .= "-----END {$title}-----\n";
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
function DerToRsa($Der)
|
|
|
|
{
|
|
|
|
//Encode:
|
|
|
|
$Der = base64_encode($Der);
|
|
|
|
//Split lines:
|
|
|
|
$lines = str_split($Der, 64);
|
|
|
|
$body = implode("\n", $lines);
|
|
|
|
//Get title:
|
|
|
|
$title = 'RSA PUBLIC KEY';
|
|
|
|
//Add wrapping:
|
|
|
|
$result = "-----BEGIN {$title}-----\n";
|
|
|
|
$result .= $body . "\n";
|
|
|
|
$result .= "-----END {$title}-----\n";
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
function pkcs8_encode($Modulus,$PublicExponent) {
|
|
|
|
//Encode key sequence
|
|
|
|
$modulus = new ASNValue(ASNValue::TAG_INTEGER);
|
|
|
|
$modulus->SetIntBuffer($Modulus);
|
|
|
|
$publicExponent = new ASNValue(ASNValue::TAG_INTEGER);
|
|
|
|
$publicExponent->SetIntBuffer($PublicExponent);
|
|
|
|
$keySequenceItems = array($modulus, $publicExponent);
|
|
|
|
$keySequence = new ASNValue(ASNValue::TAG_SEQUENCE);
|
|
|
|
$keySequence->SetSequence($keySequenceItems);
|
|
|
|
//Encode bit string
|
|
|
|
$bitStringValue = $keySequence->Encode();
|
|
|
|
$bitStringValue = chr(0x00) . $bitStringValue; //Add unused bits byte
|
|
|
|
$bitString = new ASNValue(ASNValue::TAG_BITSTRING);
|
|
|
|
$bitString->Value = $bitStringValue;
|
|
|
|
//Encode body
|
|
|
|
$bodyValue = "\x30\x0d\x06\x09\x2a\x86\x48\x86\xf7\x0d\x01\x01\x01\x05\x00" . $bitString->Encode();
|
|
|
|
$body = new ASNValue(ASNValue::TAG_SEQUENCE);
|
|
|
|
$body->Value = $bodyValue;
|
|
|
|
//Get DER encoded public key:
|
|
|
|
$PublicDER = $body->Encode();
|
|
|
|
return $PublicDER;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
function pkcs1_encode($Modulus,$PublicExponent) {
|
|
|
|
//Encode key sequence
|
|
|
|
$modulus = new ASNValue(ASNValue::TAG_INTEGER);
|
|
|
|
$modulus->SetIntBuffer($Modulus);
|
|
|
|
$publicExponent = new ASNValue(ASNValue::TAG_INTEGER);
|
|
|
|
$publicExponent->SetIntBuffer($PublicExponent);
|
|
|
|
$keySequenceItems = array($modulus, $publicExponent);
|
|
|
|
$keySequence = new ASNValue(ASNValue::TAG_SEQUENCE);
|
|
|
|
$keySequence->SetSequence($keySequenceItems);
|
|
|
|
//Encode bit string
|
|
|
|
$bitStringValue = $keySequence->Encode();
|
|
|
|
return $bitStringValue;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-03-20 08:06:33 +01:00
|
|
|
// http://stackoverflow.com/questions/27568570/how-to-convert-raw-modulus-exponent-to-rsa-public-key-pem-format
|
2015-08-23 22:38:18 +02:00
|
|
|
function metopem($m,$e) {
|
|
|
|
$der = pkcs8_encode($m,$e);
|
|
|
|
$key = DerToPem($der,false);
|
|
|
|
return $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
function pubrsatome($key,&$m,&$e) {
|
|
|
|
require_once('library/asn1.php');
|
|
|
|
|
|
|
|
$lines = explode("\n",$key);
|
|
|
|
unset($lines[0]);
|
|
|
|
unset($lines[count($lines)]);
|
|
|
|
$x = base64_decode(implode('',$lines));
|
|
|
|
|
|
|
|
$r = ASN_BASE::parseASNString($x);
|
|
|
|
|
|
|
|
$m = base64url_decode($r[0]->asnData[0]->asnData);
|
|
|
|
$e = base64url_decode($r[0]->asnData[1]->asnData);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
function rsatopem($key) {
|
|
|
|
pubrsatome($key,$m,$e);
|
|
|
|
return(metopem($m,$e));
|
|
|
|
}
|
|
|
|
|
|
|
|
function pemtorsa($key) {
|
|
|
|
pemtome($key,$m,$e);
|
|
|
|
return(metorsa($m,$e));
|
|
|
|
}
|
|
|
|
|
|
|
|
function pemtome($key,&$m,&$e) {
|
|
|
|
$lines = explode("\n",$key);
|
|
|
|
unset($lines[0]);
|
|
|
|
unset($lines[count($lines)]);
|
|
|
|
$x = base64_decode(implode('',$lines));
|
|
|
|
|
|
|
|
$r = ASN_BASE::parseASNString($x);
|
|
|
|
|
|
|
|
$m = base64url_decode($r[0]->asnData[1]->asnData[0]->asnData[0]->asnData);
|
|
|
|
$e = base64url_decode($r[0]->asnData[1]->asnData[0]->asnData[1]->asnData);
|
|
|
|
}
|
|
|
|
|
|
|
|
function metorsa($m,$e) {
|
|
|
|
$der = pkcs1_encode($m,$e);
|
|
|
|
$key = DerToRsa($der);
|
|
|
|
return $key;
|
|
|
|
}
|
|
|
|
|
2016-04-17 16:29:18 +02:00
|
|
|
|
|
|
|
|
2015-08-23 22:38:18 +02:00
|
|
|
function salmon_key($pubkey) {
|
|
|
|
pemtome($pubkey,$m,$e);
|
|
|
|
return 'RSA' . '.' . base64url_encode($m,true) . '.' . base64url_encode($e,true) ;
|
|
|
|
}
|
|
|
|
|
2016-04-17 16:29:18 +02:00
|
|
|
|
|
|
|
function convert_salmon_key($key) {
|
|
|
|
|
|
|
|
if(strstr($key,','))
|
|
|
|
$rawkey = substr($key,strpos($key,',')+1);
|
|
|
|
else
|
|
|
|
$rawkey = substr($key,5);
|
|
|
|
|
|
|
|
$key_info = explode('.',$rawkey);
|
|
|
|
|
|
|
|
$m = base64url_decode($key_info[1]);
|
|
|
|
$e = base64url_decode($key_info[2]);
|
|
|
|
|
|
|
|
logger('key details: ' . print_r($key_info,true), LOGGER_DATA);
|
|
|
|
$salmon_key = metopem($m,$e);
|
|
|
|
return $salmon_key;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-08-23 22:38:18 +02:00
|
|
|
function z_obscure($s) {
|
|
|
|
return json_encode(crypto_encapsulate($s,get_config('system','pubkey')));
|
|
|
|
}
|
|
|
|
|
|
|
|
function z_unobscure($s) {
|
|
|
|
if(strpos($s,"{\"") !== 0)
|
|
|
|
return $s;
|
|
|
|
return crypto_unencapsulate(json_decode($s,true),get_config('system','prvkey'));
|
|
|
|
}
|
2016-04-17 16:29:18 +02:00
|
|
|
|