2010-02-22 14:05:32 +00:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* StatusNet - the distributed open-source microblogging tool
|
|
|
|
* Copyright (C) 2010, StatusNet, Inc.
|
|
|
|
*
|
|
|
|
* A sample module to show best practices for StatusNet plugins
|
|
|
|
*
|
|
|
|
* PHP version 5
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
* @package StatusNet
|
|
|
|
* @author James Walker <james@status.net>
|
|
|
|
* @copyright 2010 StatusNet, Inc.
|
|
|
|
* @license http://www.fsf.org/licensing/licenses/agpl-3.0.html AGPL 3.0
|
|
|
|
* @link http://status.net/
|
|
|
|
*/
|
|
|
|
|
2010-10-08 18:42:59 +01:00
|
|
|
if (!defined('STATUSNET')) {
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2010-03-24 19:26:03 +00:00
|
|
|
require_once 'Crypt/RSA.php';
|
|
|
|
|
2013-08-18 11:10:44 +01:00
|
|
|
class Magicsig extends Managed_DataObject
|
2010-02-22 14:05:32 +00:00
|
|
|
{
|
2010-02-23 04:11:40 +00:00
|
|
|
const PUBLICKEYREL = 'magic-public-key';
|
2010-09-03 00:35:04 +01:00
|
|
|
|
2010-02-23 03:55:26 +00:00
|
|
|
public $__table = 'magicsig';
|
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
* Key to user.id/profile.id for the local user whose key we're storing.
|
|
|
|
*
|
|
|
|
* @var int
|
|
|
|
*/
|
2010-02-23 03:55:26 +00:00
|
|
|
public $user_id;
|
2011-01-05 22:05:59 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Flattened string representation of the key pair; callers should
|
|
|
|
* usually use $this->publicKey and $this->privateKey directly,
|
|
|
|
* which hold live Crypt_RSA key objects.
|
|
|
|
*
|
|
|
|
* @var string
|
|
|
|
*/
|
2010-02-22 14:05:32 +00:00
|
|
|
public $keypair;
|
2011-01-05 22:05:59 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Crypto algorithm used for this key; currently only RSA-SHA256 is supported.
|
|
|
|
*
|
|
|
|
* @var string
|
|
|
|
*/
|
2010-02-23 03:55:26 +00:00
|
|
|
public $alg;
|
2010-09-03 00:35:04 +01:00
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
* Public RSA key; gets serialized in/out via $this->keypair string.
|
|
|
|
*
|
|
|
|
* @var Crypt_RSA
|
|
|
|
*/
|
2010-03-13 02:44:18 +00:00
|
|
|
public $publicKey;
|
2011-01-05 22:05:59 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* PrivateRSA key; gets serialized in/out via $this->keypair string.
|
|
|
|
*
|
|
|
|
* @var Crypt_RSA
|
|
|
|
*/
|
2010-03-13 02:44:18 +00:00
|
|
|
public $privateKey;
|
2010-09-03 00:35:04 +01:00
|
|
|
|
2010-02-23 04:11:40 +00:00
|
|
|
public function __construct($alg = 'RSA-SHA256')
|
|
|
|
{
|
|
|
|
$this->alg = $alg;
|
|
|
|
}
|
2010-09-03 00:35:04 +01:00
|
|
|
|
2013-08-18 18:07:18 +01:00
|
|
|
/**
|
|
|
|
* Fetch a Magicsig object from the cache or database on a field match.
|
|
|
|
*
|
|
|
|
* @param string $k
|
|
|
|
* @param mixed $v
|
|
|
|
* @return Magicsig
|
|
|
|
*/
|
|
|
|
static function getKV($k, $v=null)
|
|
|
|
{
|
|
|
|
$obj = parent::getKV($k, $v);
|
2014-03-02 10:47:38 +00:00
|
|
|
if ($obj instanceof Magicsig) {
|
2014-05-31 12:34:06 +01:00
|
|
|
$obj->importKeys(); // Loads Crypt_RSA objects etc.
|
2013-08-18 18:07:18 +01:00
|
|
|
|
2014-05-31 12:34:06 +01:00
|
|
|
// Throw out a big fat warning for keys of less than 1024 bits. (
|
2014-03-02 10:47:38 +00:00
|
|
|
// The only case these show up in would be imported or
|
|
|
|
// legacy very-old-StatusNet generated keypairs.
|
|
|
|
if (strlen($obj->publicKey->modulus->toBits()) < 1024) {
|
2014-05-31 12:34:06 +01:00
|
|
|
common_log(LOG_WARNING, sprintf('Salmon key with <1024 bits (%d) belongs to profile with id==%d',
|
2014-06-02 12:35:29 +01:00
|
|
|
strlen($obj->publicKey->modulus->toBits()),
|
2014-05-31 12:34:06 +01:00
|
|
|
$obj->user_id));
|
2013-08-18 18:07:18 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $obj;
|
|
|
|
}
|
|
|
|
|
2013-08-18 14:31:18 +01:00
|
|
|
public static function schemaDef()
|
2010-02-22 14:05:32 +00:00
|
|
|
{
|
2010-02-23 03:55:26 +00:00
|
|
|
return array(
|
2013-08-18 14:31:18 +01:00
|
|
|
'fields' => array(
|
|
|
|
'user_id' => array('type' => 'int', 'not null' => true, 'description' => 'user id'),
|
2013-08-20 08:43:23 +01:00
|
|
|
'keypair' => array('type' => 'text', 'description' => 'keypair text representation'),
|
2013-08-18 14:31:18 +01:00
|
|
|
'alg' => array('type' => 'varchar', 'length' => 64, 'description' => 'algorithm'),
|
|
|
|
),
|
|
|
|
'primary key' => array('user_id'),
|
|
|
|
'foreign keys' => array(
|
2014-05-31 12:34:06 +01:00
|
|
|
'magicsig_user_id_fkey' => array('profile', array('user_id' => 'id')),
|
2013-08-18 14:31:18 +01:00
|
|
|
),
|
2010-02-23 03:55:26 +00:00
|
|
|
);
|
2010-02-22 14:05:32 +00:00
|
|
|
}
|
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
* Save this keypair into the database.
|
|
|
|
*
|
|
|
|
* Overloads default insert behavior to encode the live key objects
|
|
|
|
* as a flat string for storage.
|
|
|
|
*
|
|
|
|
* @return mixed
|
|
|
|
*/
|
2010-02-23 04:11:40 +00:00
|
|
|
function insert()
|
|
|
|
{
|
|
|
|
$this->keypair = $this->toString();
|
|
|
|
|
|
|
|
return parent::insert();
|
|
|
|
}
|
2010-02-23 04:30:05 +00:00
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
* Generate a new keypair for a local user and store in the database.
|
|
|
|
*
|
|
|
|
* Warning: this can be very slow on systems without the GMP module.
|
|
|
|
* Runtimes of 20-30 seconds are not unheard-of.
|
|
|
|
*
|
|
|
|
* @param int $user_id id of local user we're creating a key for
|
|
|
|
*/
|
2014-03-02 10:47:38 +00:00
|
|
|
public function generate($user_id, $bits=1024)
|
2010-02-22 14:05:32 +00:00
|
|
|
{
|
2010-03-24 19:18:41 +00:00
|
|
|
$rsa = new Crypt_RSA();
|
2010-09-03 00:35:04 +01:00
|
|
|
|
2014-03-02 10:47:38 +00:00
|
|
|
$keypair = $rsa->createKey($bits);
|
2010-03-13 01:02:00 +00:00
|
|
|
|
2010-03-13 02:44:18 +00:00
|
|
|
$rsa->loadKey($keypair['privatekey']);
|
2010-03-13 01:02:00 +00:00
|
|
|
|
2010-03-24 19:18:41 +00:00
|
|
|
$this->privateKey = new Crypt_RSA();
|
2010-03-13 02:44:18 +00:00
|
|
|
$this->privateKey->loadKey($keypair['privatekey']);
|
2010-03-13 01:02:00 +00:00
|
|
|
|
2010-03-24 19:18:41 +00:00
|
|
|
$this->publicKey = new Crypt_RSA();
|
2010-03-13 02:44:18 +00:00
|
|
|
$this->publicKey->loadKey($keypair['publickey']);
|
2010-09-03 00:35:04 +01:00
|
|
|
|
2010-02-26 04:37:59 +00:00
|
|
|
$this->user_id = $user_id;
|
2010-02-23 04:11:40 +00:00
|
|
|
$this->insert();
|
2010-02-22 14:05:32 +00:00
|
|
|
}
|
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
* Encode the keypair or public key as a string.
|
|
|
|
*
|
|
|
|
* @param boolean $full_pair set to false to leave out the private key.
|
|
|
|
* @return string
|
|
|
|
*/
|
2010-02-22 14:05:32 +00:00
|
|
|
public function toString($full_pair = true)
|
|
|
|
{
|
2010-03-26 17:37:46 +00:00
|
|
|
$mod = Magicsig::base64_url_encode($this->publicKey->modulus->toBytes());
|
|
|
|
$exp = Magicsig::base64_url_encode($this->publicKey->exponent->toBytes());
|
2010-02-22 14:05:32 +00:00
|
|
|
$private_exp = '';
|
2010-03-13 01:02:00 +00:00
|
|
|
if ($full_pair && $this->privateKey->exponent->toBytes()) {
|
2010-03-26 17:37:46 +00:00
|
|
|
$private_exp = '.' . Magicsig::base64_url_encode($this->privateKey->exponent->toBytes());
|
2010-02-22 14:05:32 +00:00
|
|
|
}
|
|
|
|
|
2010-09-03 00:35:04 +01:00
|
|
|
return 'RSA.' . $mod . '.' . $exp . $private_exp;
|
2010-02-22 14:05:32 +00:00
|
|
|
}
|
2010-09-03 00:35:04 +01:00
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
* Decode a string representation of an RSA public key or keypair
|
|
|
|
* as a Magicsig object which can be used to sign or verify.
|
|
|
|
*
|
|
|
|
* @param string $text
|
|
|
|
* @return Magicsig
|
|
|
|
*/
|
2010-02-23 04:11:40 +00:00
|
|
|
public static function fromString($text)
|
2010-02-22 14:05:32 +00:00
|
|
|
{
|
2010-02-23 04:11:40 +00:00
|
|
|
$magic_sig = new Magicsig();
|
2010-09-03 00:35:04 +01:00
|
|
|
|
2010-02-22 14:05:32 +00:00
|
|
|
// remove whitespace
|
2014-05-31 12:34:06 +01:00
|
|
|
$magic_sig->keypair = preg_replace('/\s+/', '', $text);
|
|
|
|
$magic_sig->importKeys();
|
2010-02-22 14:05:32 +00:00
|
|
|
|
2014-05-31 12:34:06 +01:00
|
|
|
// Please note this object will be missing the user_id field
|
|
|
|
return $magic_sig;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* importKeys will load the object's keypair string, which initiates
|
|
|
|
* loadKey() and configures Crypt_RSA objects.
|
|
|
|
*/
|
|
|
|
public function importKeys()
|
|
|
|
{
|
2010-02-22 14:05:32 +00:00
|
|
|
// parse components
|
2014-05-31 12:34:06 +01:00
|
|
|
if (!preg_match('/RSA\.([^\.]+)\.([^\.]+)(.([^\.]+))?/', $this->keypair, $matches)) {
|
2014-05-05 16:48:21 +01:00
|
|
|
common_debug('Magicsig error: RSA key not found in provided string.');
|
2014-05-31 12:34:06 +01:00
|
|
|
throw new ServerException('RSA key not found in keypair string.');
|
2010-02-22 14:05:32 +00:00
|
|
|
}
|
2010-09-03 00:35:04 +01:00
|
|
|
|
2010-03-13 00:34:45 +00:00
|
|
|
$mod = $matches[1];
|
|
|
|
$exp = $matches[2];
|
2010-03-02 00:35:36 +00:00
|
|
|
if (!empty($matches[4])) {
|
2010-03-13 00:34:45 +00:00
|
|
|
$private_exp = $matches[4];
|
2010-03-02 00:35:36 +00:00
|
|
|
} else {
|
|
|
|
$private_exp = false;
|
2010-02-22 14:05:32 +00:00
|
|
|
}
|
|
|
|
|
2014-05-31 12:34:06 +01:00
|
|
|
$this->loadKey($mod, $exp, 'public');
|
2010-02-22 14:05:32 +00:00
|
|
|
if ($private_exp) {
|
2014-05-31 12:34:06 +01:00
|
|
|
$this->loadKey($mod, $private_exp, 'private');
|
2010-02-22 14:05:32 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
* Fill out $this->privateKey or $this->publicKey with a Crypt_RSA object
|
|
|
|
* representing the give key (as mod/exponent pair).
|
|
|
|
*
|
|
|
|
* @param string $mod base64-encoded
|
|
|
|
* @param string $exp base64-encoded exponent
|
|
|
|
* @param string $type one of 'public' or 'private'
|
|
|
|
*/
|
2010-03-13 00:34:45 +00:00
|
|
|
public function loadKey($mod, $exp, $type = 'public')
|
|
|
|
{
|
|
|
|
common_log(LOG_DEBUG, "Adding ".$type." key: (".$mod .', '. $exp .")");
|
|
|
|
|
2010-03-24 19:18:41 +00:00
|
|
|
$rsa = new Crypt_RSA();
|
2010-03-13 00:34:45 +00:00
|
|
|
$rsa->signatureMode = CRYPT_RSA_SIGNATURE_PKCS1;
|
|
|
|
$rsa->setHash('sha256');
|
2010-03-26 17:37:46 +00:00
|
|
|
$rsa->modulus = new Math_BigInteger(Magicsig::base64_url_decode($mod), 256);
|
2010-03-13 00:34:45 +00:00
|
|
|
$rsa->k = strlen($rsa->modulus->toBytes());
|
2010-03-26 17:37:46 +00:00
|
|
|
$rsa->exponent = new Math_BigInteger(Magicsig::base64_url_decode($exp), 256);
|
2010-03-13 00:34:45 +00:00
|
|
|
|
|
|
|
if ($type == 'private') {
|
|
|
|
$this->privateKey = $rsa;
|
|
|
|
} else {
|
|
|
|
$this->publicKey = $rsa;
|
|
|
|
}
|
|
|
|
}
|
2010-09-03 00:35:04 +01:00
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
* Returns the name of the crypto algorithm used for this key.
|
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
2010-02-22 14:05:32 +00:00
|
|
|
public function getName()
|
|
|
|
{
|
2010-02-23 04:44:33 +00:00
|
|
|
return $this->alg;
|
2010-02-22 14:05:32 +00:00
|
|
|
}
|
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
* Returns the name of a hash function to use for signing with this key.
|
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
* @fixme is this used? doesn't seem to be called by name.
|
|
|
|
*/
|
2010-02-23 04:11:40 +00:00
|
|
|
public function getHash()
|
|
|
|
{
|
|
|
|
switch ($this->alg) {
|
|
|
|
|
|
|
|
case 'RSA-SHA256':
|
2010-03-13 02:44:18 +00:00
|
|
|
return 'sha256';
|
2010-02-23 04:11:40 +00:00
|
|
|
}
|
|
|
|
}
|
2010-09-03 00:35:04 +01:00
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
* Generate base64-encoded signature for the given byte string
|
|
|
|
* using our private key.
|
|
|
|
*
|
|
|
|
* @param string $bytes as raw byte string
|
2014-06-02 13:51:15 +01:00
|
|
|
* @return string base64url-encoded signature
|
2011-01-05 22:05:59 +00:00
|
|
|
*/
|
2010-02-22 14:05:32 +00:00
|
|
|
public function sign($bytes)
|
|
|
|
{
|
2010-03-13 00:34:45 +00:00
|
|
|
$sig = $this->privateKey->sign($bytes);
|
2014-05-27 10:32:12 +01:00
|
|
|
if ($sig === false) {
|
|
|
|
throw new ServerException('Could not sign data');
|
|
|
|
}
|
2010-03-26 17:37:46 +00:00
|
|
|
return Magicsig::base64_url_encode($sig);
|
2010-02-22 14:05:32 +00:00
|
|
|
}
|
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @param string $signed_bytes as raw byte string
|
2014-06-02 13:51:15 +01:00
|
|
|
* @param string $signature as base64url encoded
|
2011-01-05 22:05:59 +00:00
|
|
|
* @return boolean
|
|
|
|
*/
|
2010-02-22 14:05:32 +00:00
|
|
|
public function verify($signed_bytes, $signature)
|
|
|
|
{
|
2010-03-26 17:37:46 +00:00
|
|
|
$signature = Magicsig::base64_url_decode($signature);
|
2010-03-13 00:34:45 +00:00
|
|
|
return $this->publicKey->verify($signed_bytes, $signature);
|
2010-02-22 14:05:32 +00:00
|
|
|
}
|
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
* URL-encoding-friendly base64 variant encoding.
|
|
|
|
*
|
|
|
|
* @param string $input
|
|
|
|
* @return string
|
|
|
|
*/
|
2010-03-26 17:37:46 +00:00
|
|
|
public static function base64_url_encode($input)
|
|
|
|
{
|
|
|
|
return strtr(base64_encode($input), '+/', '-_');
|
|
|
|
}
|
|
|
|
|
2011-01-05 22:05:59 +00:00
|
|
|
/**
|
|
|
|
* URL-encoding-friendly base64 variant decoding.
|
|
|
|
*
|
|
|
|
* @param string $input
|
|
|
|
* @return string
|
|
|
|
*/
|
2010-03-26 17:37:46 +00:00
|
|
|
public static function base64_url_decode($input)
|
|
|
|
{
|
|
|
|
return base64_decode(strtr($input, '-_', '+/'));
|
|
|
|
}
|
2010-03-12 19:19:56 +00:00
|
|
|
}
|