488 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			488 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
| <?php
 | |
| /**
 | |
|  * PKCS Formatted RSA Key Handler
 | |
|  *
 | |
|  * PHP version 5
 | |
|  *
 | |
|  * @category  Crypt
 | |
|  * @package   RSA
 | |
|  * @author    Jim Wigginton <terrafrost@php.net>
 | |
|  * @copyright 2015 Jim Wigginton
 | |
|  * @license   http://www.opensource.org/licenses/mit-license.html  MIT License
 | |
|  * @link      http://phpseclib.sourceforge.net
 | |
|  */
 | |
| 
 | |
| namespace phpseclib\Crypt\RSA;
 | |
| 
 | |
| use ParagonIE\ConstantTime\Base64;
 | |
| use ParagonIE\ConstantTime\Hex;
 | |
| use phpseclib\Crypt\AES;
 | |
| use phpseclib\Crypt\Base;
 | |
| use phpseclib\Crypt\DES;
 | |
| use phpseclib\Crypt\TripleDES;
 | |
| use phpseclib\Math\BigInteger;
 | |
| 
 | |
| /**
 | |
|  * PKCS Formatted RSA Key Handler
 | |
|  *
 | |
|  * @package RSA
 | |
|  * @author  Jim Wigginton <terrafrost@php.net>
 | |
|  * @access  public
 | |
|  */
 | |
| abstract class PKCS
 | |
| {
 | |
|     /**#@+
 | |
|      * @access private
 | |
|      * @see \phpseclib\Crypt\RSA::createKey()
 | |
|      */
 | |
|     /**
 | |
|      * ASN1 Integer
 | |
|      */
 | |
|     const ASN1_INTEGER = 2;
 | |
|     /**
 | |
|      * ASN1 Bit String
 | |
|      */
 | |
|     const ASN1_BITSTRING = 3;
 | |
|     /**
 | |
|      * ASN1 Octet String
 | |
|      */
 | |
|     const ASN1_OCTETSTRING = 4;
 | |
|     /**
 | |
|      * ASN1 Object Identifier
 | |
|      */
 | |
|     const ASN1_OBJECT = 6;
 | |
|     /**
 | |
|      * ASN1 Sequence (with the constucted bit set)
 | |
|      */
 | |
|     const ASN1_SEQUENCE = 48;
 | |
|     /**#@-*/
 | |
| 
 | |
|     /**#@+
 | |
|      * @access private
 | |
|      */
 | |
|     /**
 | |
|      * Auto-detect the format
 | |
|      */
 | |
|     const MODE_ANY = 0;
 | |
|     /**
 | |
|      * Require base64-encoded PEM's be supplied
 | |
|      */
 | |
|     const MODE_PEM = 1;
 | |
|     /**
 | |
|      * Require raw DER's be supplied
 | |
|      */
 | |
|     const MODE_DER = 2;
 | |
|     /**#@-*/
 | |
| 
 | |
|     /**
 | |
|      * Is the key a base-64 encoded PEM, DER or should it be auto-detected?
 | |
|      *
 | |
|      * @access private
 | |
|      * @param int
 | |
|      */
 | |
|     static $format = self::MODE_ANY;
 | |
| 
 | |
|     /**
 | |
|      * Returns the mode constant corresponding to the mode string
 | |
|      *
 | |
|      * @access public
 | |
|      * @param string $mode
 | |
|      * @return int
 | |
|      * @throws \UnexpectedValueException if the block cipher mode is unsupported
 | |
|      */
 | |
|     static function getEncryptionMode($mode)
 | |
|     {
 | |
|         switch ($mode) {
 | |
|             case 'CBC':
 | |
|                 return Base::MODE_CBC;
 | |
|             case 'ECB':
 | |
|                 return Base::MODE_ECB;
 | |
|             case 'CFB':
 | |
|                 return Base::MODE_CFB;
 | |
|             case 'OFB':
 | |
|                 return Base::MODE_OFB;
 | |
|             case 'CTR':
 | |
|                 return Base::MODE_CTR;
 | |
|         }
 | |
|         throw new \UnexpectedValueException('Unsupported block cipher mode of operation');
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Returns a cipher object corresponding to a string
 | |
|      *
 | |
|      * @access public
 | |
|      * @param string $algo
 | |
|      * @return string
 | |
|      * @throws \UnexpectedValueException if the encryption algorithm is unsupported
 | |
|      */
 | |
|     static function getEncryptionObject($algo)
 | |
|     {
 | |
|         $modes = '(CBC|ECB|CFB|OFB|CTR)';
 | |
|         switch (true) {
 | |
|             case preg_match("#^AES-(128|192|256)-$modes$#", $algo, $matches):
 | |
|                 $cipher = new AES(self::getEncryptionMode($matches[2]));
 | |
|                 $cipher->setKeyLength($matches[1]);
 | |
|                 return $cipher;
 | |
|             case preg_match("#^DES-EDE3-$modes$#", $algo, $matches):
 | |
|                 return new TripleDES(self::getEncryptionMode($matches[1]));
 | |
|             case preg_match("#^DES-$modes$#", $algo, $matches):
 | |
|                 return new DES(self::getEncryptionMode($matches[1]));
 | |
|             default:
 | |
|                 throw new \UnexpectedValueException('Unsupported encryption algorithmn');
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Generate a symmetric key for PKCS#1 keys
 | |
|      *
 | |
|      * @access public
 | |
|      * @param string $password
 | |
|      * @param string $iv
 | |
|      * @param int $length
 | |
|      * @return string
 | |
|      */
 | |
|     static function generateSymmetricKey($password, $iv, $length)
 | |
|     {
 | |
|         $symkey = '';
 | |
|         $iv = substr($iv, 0, 8);
 | |
|         while (strlen($symkey) < $length) {
 | |
|             $symkey.= md5($symkey . $password . $iv, true);
 | |
|         }
 | |
|         return substr($symkey, 0, $length);
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Break a public or private key down into its constituent components
 | |
|      *
 | |
|      * @access public
 | |
|      * @param string $key
 | |
|      * @param string $password optional
 | |
|      * @return array
 | |
|      */
 | |
|     static function load($key, $password = '')
 | |
|     {
 | |
|         if (!is_string($key)) {
 | |
|             return false;
 | |
|         }
 | |
| 
 | |
|         $components = array('isPublicKey' => strpos($key, 'PUBLIC') !== false);
 | |
| 
 | |
|         /* Although PKCS#1 proposes a format that public and private keys can use, encrypting them is
 | |
|            "outside the scope" of PKCS#1.  PKCS#1 then refers you to PKCS#12 and PKCS#15 if you're wanting to
 | |
|            protect private keys, however, that's not what OpenSSL* does.  OpenSSL protects private keys by adding
 | |
|            two new "fields" to the key - DEK-Info and Proc-Type.  These fields are discussed here:
 | |
| 
 | |
|            http://tools.ietf.org/html/rfc1421#section-4.6.1.1
 | |
|            http://tools.ietf.org/html/rfc1421#section-4.6.1.3
 | |
| 
 | |
|            DES-EDE3-CBC as an algorithm, however, is not discussed anywhere, near as I can tell.
 | |
|            DES-CBC and DES-EDE are discussed in RFC1423, however, DES-EDE3-CBC isn't, nor is its key derivation
 | |
|            function.  As is, the definitive authority on this encoding scheme isn't the IETF but rather OpenSSL's
 | |
|            own implementation.  ie. the implementation *is* the standard and any bugs that may exist in that
 | |
|            implementation are part of the standard, as well.
 | |
| 
 | |
|            * OpenSSL is the de facto standard.  It's utilized by OpenSSH and other projects */
 | |
|         if (preg_match('#DEK-Info: (.+),(.+)#', $key, $matches)) {
 | |
|             $iv = Hex::decode(trim($matches[2]));
 | |
|             // remove the Proc-Type / DEK-Info sections as they're no longer needed
 | |
|             $key = preg_replace('#^(?:Proc-Type|DEK-Info): .*#m', '', $key);
 | |
|             $ciphertext = self::_extractBER($key);
 | |
|             if ($ciphertext === false) {
 | |
|                 $ciphertext = $key;
 | |
|             }
 | |
|             $crypto = self::getEncryptionObject($matches[1]);
 | |
|             $crypto->setKey(self::generateSymmetricKey($password, $iv, $crypto->getKeyLength() >> 3));
 | |
|             $crypto->setIV($iv);
 | |
|             $key = $crypto->decrypt($ciphertext);
 | |
|             if ($key === false) {
 | |
|                 return false;
 | |
|             }
 | |
|         } else {
 | |
|             if (self::$format != self::MODE_DER) {
 | |
|                 $decoded = self::_extractBER($key);
 | |
|                 if ($decoded !== false) {
 | |
|                     $key = $decoded;
 | |
|                 } elseif (self::$format == self::MODE_PEM) {
 | |
|                     return false;
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         if (ord(self::_string_shift($key)) != self::ASN1_SEQUENCE) {
 | |
|             return false;
 | |
|         }
 | |
|         if (self::_decodeLength($key) != strlen($key)) {
 | |
|             return false;
 | |
|         }
 | |
| 
 | |
|         $tag = ord(self::_string_shift($key));
 | |
|         /* intended for keys for which OpenSSL's asn1parse returns the following:
 | |
| 
 | |
|             0:d=0  hl=4 l= 631 cons: SEQUENCE
 | |
|             4:d=1  hl=2 l=   1 prim:  INTEGER           :00
 | |
|             7:d=1  hl=2 l=  13 cons:  SEQUENCE
 | |
|             9:d=2  hl=2 l=   9 prim:   OBJECT            :rsaEncryption
 | |
|            20:d=2  hl=2 l=   0 prim:   NULL
 | |
|            22:d=1  hl=4 l= 609 prim:  OCTET STRING
 | |
| 
 | |
|            ie. PKCS8 keys */
 | |
| 
 | |
|         if ($tag == self::ASN1_INTEGER && substr($key, 0, 3) == "\x01\x00\x30") {
 | |
|             self::_string_shift($key, 3);
 | |
|             $tag = self::ASN1_SEQUENCE;
 | |
|         }
 | |
| 
 | |
|         if ($tag == self::ASN1_SEQUENCE) {
 | |
|             $temp = self::_string_shift($key, self::_decodeLength($key));
 | |
|             if (ord(self::_string_shift($temp)) != self::ASN1_OBJECT) {
 | |
|                 return false;
 | |
|             }
 | |
|             $length = self::_decodeLength($temp);
 | |
|             switch (self::_string_shift($temp, $length)) {
 | |
|                 case "\x2a\x86\x48\x86\xf7\x0d\x01\x01\x01": // rsaEncryption
 | |
|                     break;
 | |
|                 case "\x2a\x86\x48\x86\xf7\x0d\x01\x05\x03": // pbeWithMD5AndDES-CBC
 | |
|                     /*
 | |
|                        PBEParameter ::= SEQUENCE {
 | |
|                            salt OCTET STRING (SIZE(8)),
 | |
|                            iterationCount INTEGER }
 | |
|                     */
 | |
|                     if (ord(self::_string_shift($temp)) != self::ASN1_SEQUENCE) {
 | |
|                         return false;
 | |
|                     }
 | |
|                     if (self::_decodeLength($temp) != strlen($temp)) {
 | |
|                         return false;
 | |
|                     }
 | |
|                     self::_string_shift($temp); // assume it's an octet string
 | |
|                     $salt = self::_string_shift($temp, self::_decodeLength($temp));
 | |
|                     if (ord(self::_string_shift($temp)) != self::ASN1_INTEGER) {
 | |
|                         return false;
 | |
|                     }
 | |
|                     self::_decodeLength($temp);
 | |
|                     list(, $iterationCount) = unpack('N', str_pad($temp, 4, chr(0), STR_PAD_LEFT));
 | |
|                     self::_string_shift($key); // assume it's an octet string
 | |
|                     $length = self::_decodeLength($key);
 | |
|                     if (strlen($key) != $length) {
 | |
|                         return false;
 | |
|                     }
 | |
| 
 | |
|                     $crypto = new DES(DES::MODE_CBC);
 | |
|                     $crypto->setPassword($password, 'pbkdf1', 'md5', $salt, $iterationCount);
 | |
|                     $key = $crypto->decrypt($key);
 | |
|                     if ($key === false) {
 | |
|                         return false;
 | |
|                     }
 | |
|                     return self::load($key);
 | |
|                 default:
 | |
|                     return false;
 | |
|             }
 | |
|             /* intended for keys for which OpenSSL's asn1parse returns the following:
 | |
| 
 | |
|                 0:d=0  hl=4 l= 290 cons: SEQUENCE
 | |
|                 4:d=1  hl=2 l=  13 cons:  SEQUENCE
 | |
|                 6:d=2  hl=2 l=   9 prim:   OBJECT            :rsaEncryption
 | |
|                17:d=2  hl=2 l=   0 prim:   NULL
 | |
|                19:d=1  hl=4 l= 271 prim:  BIT STRING */
 | |
|             $tag = ord(self::_string_shift($key)); // skip over the BIT STRING / OCTET STRING tag
 | |
|             self::_decodeLength($key); // skip over the BIT STRING / OCTET STRING length
 | |
|             // "The initial octet shall encode, as an unsigned binary integer wtih bit 1 as the least significant bit, the number of
 | |
|             //  unused bits in the final subsequent octet. The number shall be in the range zero to seven."
 | |
|             //  -- http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf (section 8.6.2.2)
 | |
|             if ($tag == self::ASN1_BITSTRING) {
 | |
|                 self::_string_shift($key);
 | |
|             }
 | |
|             if (ord(self::_string_shift($key)) != self::ASN1_SEQUENCE) {
 | |
|                 return false;
 | |
|             }
 | |
|             if (self::_decodeLength($key) != strlen($key)) {
 | |
|                 return false;
 | |
|             }
 | |
|             $tag = ord(self::_string_shift($key));
 | |
|         }
 | |
|         if ($tag != self::ASN1_INTEGER) {
 | |
|             return false;
 | |
|         }
 | |
| 
 | |
|         $length = self::_decodeLength($key);
 | |
|         $temp = self::_string_shift($key, $length);
 | |
|         if (strlen($temp) != 1 || ord($temp) > 2) {
 | |
|             $components['modulus'] = new BigInteger($temp, 256);
 | |
|             self::_string_shift($key); // skip over self::ASN1_INTEGER
 | |
|             $length = self::_decodeLength($key);
 | |
|             $components[$components['isPublicKey'] ? 'publicExponent' : 'privateExponent'] = new BigInteger(self::_string_shift($key, $length), 256);
 | |
| 
 | |
|             return $components;
 | |
|         }
 | |
|         if (ord(self::_string_shift($key)) != self::ASN1_INTEGER) {
 | |
|             return false;
 | |
|         }
 | |
|         $length = self::_decodeLength($key);
 | |
|         $components['modulus'] = new BigInteger(self::_string_shift($key, $length), 256);
 | |
|         self::_string_shift($key);
 | |
|         $length = self::_decodeLength($key);
 | |
|         $components['publicExponent'] = new BigInteger(self::_string_shift($key, $length), 256);
 | |
|         self::_string_shift($key);
 | |
|         $length = self::_decodeLength($key);
 | |
|         $components['privateExponent'] = new BigInteger(self::_string_shift($key, $length), 256);
 | |
|         self::_string_shift($key);
 | |
|         $length = self::_decodeLength($key);
 | |
|         $components['primes'] = array(1 => new BigInteger(self::_string_shift($key, $length), 256));
 | |
|         self::_string_shift($key);
 | |
|         $length = self::_decodeLength($key);
 | |
|         $components['primes'][] = new BigInteger(self::_string_shift($key, $length), 256);
 | |
|         self::_string_shift($key);
 | |
|         $length = self::_decodeLength($key);
 | |
|         $components['exponents'] = array(1 => new BigInteger(self::_string_shift($key, $length), 256));
 | |
|         self::_string_shift($key);
 | |
|         $length = self::_decodeLength($key);
 | |
|         $components['exponents'][] = new BigInteger(self::_string_shift($key, $length), 256);
 | |
|         self::_string_shift($key);
 | |
|         $length = self::_decodeLength($key);
 | |
|         $components['coefficients'] = array(2 => new BigInteger(self::_string_shift($key, $length), 256));
 | |
| 
 | |
|         if (!empty($key)) {
 | |
|             if (ord(self::_string_shift($key)) != self::ASN1_SEQUENCE) {
 | |
|                 return false;
 | |
|             }
 | |
|             self::_decodeLength($key);
 | |
|             while (!empty($key)) {
 | |
|                 if (ord(self::_string_shift($key)) != self::ASN1_SEQUENCE) {
 | |
|                     return false;
 | |
|                 }
 | |
|                 self::_decodeLength($key);
 | |
|                 $key = substr($key, 1);
 | |
|                 $length = self::_decodeLength($key);
 | |
|                 $components['primes'][] = new BigInteger(self::_string_shift($key, $length), 256);
 | |
|                 self::_string_shift($key);
 | |
|                 $length = self::_decodeLength($key);
 | |
|                 $components['exponents'][] = new BigInteger(self::_string_shift($key, $length), 256);
 | |
|                 self::_string_shift($key);
 | |
|                 $length = self::_decodeLength($key);
 | |
|                 $components['coefficients'][] = new BigInteger(self::_string_shift($key, $length), 256);
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         return $components;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Require base64-encoded PEM's be supplied
 | |
|      *
 | |
|      * @see self::load()
 | |
|      * @access public
 | |
|      */
 | |
|     static function requirePEM()
 | |
|     {
 | |
|         self::$format = self::MODE_PEM;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Require raw DER's be supplied
 | |
|      *
 | |
|      * @see self::load()
 | |
|      * @access public
 | |
|      */
 | |
|     static function requireDER()
 | |
|     {
 | |
|         self::$format = self::MODE_DER;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Accept any format and auto detect the format
 | |
|      *
 | |
|      * This is the default setting
 | |
|      *
 | |
|      * @see self::load()
 | |
|      * @access public
 | |
|      */
 | |
|     static function requireAny()
 | |
|     {
 | |
|         self::$format = self::MODE_ANY;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * DER-decode the length
 | |
|      *
 | |
|      * DER supports lengths up to (2**8)**127, however, we'll only support lengths up to (2**8)**4.  See
 | |
|      * {@link http://itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#p=13 X.690 paragraph 8.1.3} for more information.
 | |
|      *
 | |
|      * @access private
 | |
|      * @param string $string
 | |
|      * @return int
 | |
|      */
 | |
|     static function _decodeLength(&$string)
 | |
|     {
 | |
|         $length = ord(self::_string_shift($string));
 | |
|         if ($length & 0x80) { // definite length, long form
 | |
|             $length&= 0x7F;
 | |
|             $temp = self::_string_shift($string, $length);
 | |
|             list(, $length) = unpack('N', substr(str_pad($temp, 4, chr(0), STR_PAD_LEFT), -4));
 | |
|         }
 | |
|         return $length;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * DER-encode the length
 | |
|      *
 | |
|      * DER supports lengths up to (2**8)**127, however, we'll only support lengths up to (2**8)**4.  See
 | |
|      * {@link http://itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#p=13 X.690 paragraph 8.1.3} for more information.
 | |
|      *
 | |
|      * @access private
 | |
|      * @param int $length
 | |
|      * @return string
 | |
|      */
 | |
|     static function _encodeLength($length)
 | |
|     {
 | |
|         if ($length <= 0x7F) {
 | |
|             return chr($length);
 | |
|         }
 | |
| 
 | |
|         $temp = ltrim(pack('N', $length), chr(0));
 | |
|         return pack('Ca*', 0x80 | strlen($temp), $temp);
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * String Shift
 | |
|      *
 | |
|      * Inspired by array_shift
 | |
|      *
 | |
|      * @param string $string
 | |
|      * @param int $index
 | |
|      * @return string
 | |
|      * @access private
 | |
|      */
 | |
|     static function _string_shift(&$string, $index = 1)
 | |
|     {
 | |
|         $substr = substr($string, 0, $index);
 | |
|         $string = substr($string, $index);
 | |
|         return $substr;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Extract raw BER from Base64 encoding
 | |
|      *
 | |
|      * @access private
 | |
|      * @param string $str
 | |
|      * @return string
 | |
|      */
 | |
|     static function _extractBER($str)
 | |
|     {
 | |
|         /* X.509 certs are assumed to be base64 encoded but sometimes they'll have additional things in them
 | |
|          * above and beyond the ceritificate.
 | |
|          * ie. some may have the following preceding the -----BEGIN CERTIFICATE----- line:
 | |
|          *
 | |
|          * Bag Attributes
 | |
|          *     localKeyID: 01 00 00 00
 | |
|          * subject=/O=organization/OU=org unit/CN=common name
 | |
|          * issuer=/O=organization/CN=common name
 | |
|          */
 | |
|         $temp = preg_replace('#.*?^-+[^-]+-+[\r\n ]*$#ms', '', $str, 1);
 | |
|         // remove the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- stuff
 | |
|         $temp = preg_replace('#-+[^-]+-+#', '', $temp);
 | |
|         // remove new lines
 | |
|         $temp = str_replace(array("\r", "\n", ' '), '', $temp);
 | |
|         $temp = preg_match('#^[a-zA-Z\d/+]*={0,2}$#', $temp) ? Base64::decode($temp) : false;
 | |
|         return $temp != false ? $temp : $str;
 | |
|     }
 | |
| }
 |