2011-07-26 04:57:17 +02:00
|
|
|
<?php
|
|
|
|
|
|
|
|
require_once('library/ASNValue.class.php');
|
2011-08-10 03:55:46 +02:00
|
|
|
require_once('library/asn1.php');
|
|
|
|
|
2011-08-21 00:09:09 +02:00
|
|
|
// supported algorithms are 'sha256', 'sha1'
|
2011-08-10 03:55:46 +02:00
|
|
|
|
2011-08-21 00:09:09 +02:00
|
|
|
function rsa_sign($data,$key,$alg = 'sha256') {
|
2011-08-10 03:55:46 +02:00
|
|
|
|
|
|
|
$sig = '';
|
2011-08-21 00:09:09 +02:00
|
|
|
if (version_compare(PHP_VERSION, '5.3.0', '>=') || $alg === 'sha1') {
|
2011-08-21 05:54:03 +02:00
|
|
|
openssl_sign($data,$sig,$key,(($alg == 'sha1') ? OPENSSL_ALGO_SHA1 : $alg));
|
2011-08-10 03:55:46 +02:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
if(strlen($key) < 1024 || extension_loaded('gmp')) {
|
|
|
|
require_once('library/phpsec/Crypt/RSA.php');
|
|
|
|
$rsa = new CRYPT_RSA();
|
|
|
|
$rsa->signatureMode = CRYPT_RSA_SIGNATURE_PKCS1;
|
2011-08-21 00:09:09 +02:00
|
|
|
$rsa->setHash($alg);
|
2011-08-10 03:55:46 +02:00
|
|
|
$rsa->loadKey($key);
|
|
|
|
$sig = $rsa->sign($data);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
logger('rsa_sign: insecure algorithm used. Please upgrade PHP to 5.3');
|
|
|
|
openssl_private_encrypt(hex2bin('3031300d060960864801650304020105000420') . hash('sha256',$data,true), $sig, $key);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $sig;
|
|
|
|
}
|
|
|
|
|
2011-08-21 00:09:09 +02:00
|
|
|
function rsa_verify($data,$sig,$key,$alg = 'sha256') {
|
2011-08-10 03:55:46 +02:00
|
|
|
|
2011-08-21 00:09:09 +02:00
|
|
|
if (version_compare(PHP_VERSION, '5.3.0', '>=') || $alg === 'sha1') {
|
2011-08-21 05:54:03 +02:00
|
|
|
$verify = openssl_verify($data,$sig,$key,(($alg == 'sha1') ? OPENSSL_ALGO_SHA1 : $alg));
|
2011-08-10 03:55:46 +02:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
if(strlen($key) <= 300 || extension_loaded('gmp')) {
|
|
|
|
require_once('library/phpsec/Crypt/RSA.php');
|
|
|
|
$rsa = new CRYPT_RSA();
|
|
|
|
$rsa->signatureMode = CRYPT_RSA_SIGNATURE_PKCS1;
|
2011-08-21 00:09:09 +02:00
|
|
|
$rsa->setHash($alg);
|
2011-08-10 03:55:46 +02:00
|
|
|
$rsa->loadKey($key);
|
|
|
|
$verify = $rsa->verify($data,$sig);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
// fallback sha256 verify for PHP < 5.3 and large key lengths
|
|
|
|
$rawsig = '';
|
|
|
|
openssl_public_decrypt($sig,$rawsig,$key);
|
|
|
|
$verify = (($rawsig && substr($rawsig,-32) === hash('sha256',$data,true)) ? true : false);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $verify;
|
|
|
|
}
|
|
|
|
|
2011-07-26 04:57:17 +02:00
|
|
|
|
|
|
|
function DerToPem($Der, $Private=false)
|
|
|
|
{
|
|
|
|
//Encode:
|
|
|
|
$Der = base64_encode($Der);
|
|
|
|
//Split lines:
|
|
|
|
$lines = str_split($Der, 65);
|
|
|
|
$body = implode("\n", $lines);
|
|
|
|
//Get title:
|
|
|
|
$title = $Private? 'RSA PRIVATE KEY' : 'PUBLIC KEY';
|
|
|
|
//Add wrapping:
|
|
|
|
$result = "-----BEGIN {$title}-----\n";
|
|
|
|
$result .= $body . "\n";
|
|
|
|
$result .= "-----END {$title}-----\n";
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2011-07-29 03:16:57 +02:00
|
|
|
function DerToRsa($Der)
|
|
|
|
{
|
|
|
|
//Encode:
|
|
|
|
$Der = base64_encode($Der);
|
|
|
|
//Split lines:
|
2011-08-20 13:53:11 +02:00
|
|
|
$lines = str_split($Der, 64);
|
2011-07-29 03:16:57 +02:00
|
|
|
$body = implode("\n", $lines);
|
|
|
|
//Get title:
|
|
|
|
$title = 'RSA PUBLIC KEY';
|
|
|
|
//Add wrapping:
|
|
|
|
$result = "-----BEGIN {$title}-----\n";
|
|
|
|
$result .= $body . "\n";
|
|
|
|
$result .= "-----END {$title}-----\n";
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-07-26 04:57:17 +02:00
|
|
|
function pkcs8_encode($Modulus,$PublicExponent) {
|
|
|
|
//Encode key sequence
|
|
|
|
$modulus = new ASNValue(ASNValue::TAG_INTEGER);
|
|
|
|
$modulus->SetIntBuffer($Modulus);
|
|
|
|
$publicExponent = new ASNValue(ASNValue::TAG_INTEGER);
|
2011-07-29 03:16:57 +02:00
|
|
|
$publicExponent->SetIntBuffer($PublicExponent);
|
2011-07-26 04:57:17 +02:00
|
|
|
$keySequenceItems = array($modulus, $publicExponent);
|
|
|
|
$keySequence = new ASNValue(ASNValue::TAG_SEQUENCE);
|
|
|
|
$keySequence->SetSequence($keySequenceItems);
|
|
|
|
//Encode bit string
|
|
|
|
$bitStringValue = $keySequence->Encode();
|
|
|
|
$bitStringValue = chr(0x00) . $bitStringValue; //Add unused bits byte
|
|
|
|
$bitString = new ASNValue(ASNValue::TAG_BITSTRING);
|
|
|
|
$bitString->Value = $bitStringValue;
|
|
|
|
//Encode body
|
|
|
|
$bodyValue = "\x30\x0d\x06\x09\x2a\x86\x48\x86\xf7\x0d\x01\x01\x01\x05\x00" . $bitString->Encode();
|
|
|
|
$body = new ASNValue(ASNValue::TAG_SEQUENCE);
|
|
|
|
$body->Value = $bodyValue;
|
|
|
|
//Get DER encoded public key:
|
|
|
|
$PublicDER = $body->Encode();
|
|
|
|
return $PublicDER;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-07-29 03:16:57 +02:00
|
|
|
function pkcs1_encode($Modulus,$PublicExponent) {
|
|
|
|
//Encode key sequence
|
|
|
|
$modulus = new ASNValue(ASNValue::TAG_INTEGER);
|
|
|
|
$modulus->SetIntBuffer($Modulus);
|
|
|
|
$publicExponent = new ASNValue(ASNValue::TAG_INTEGER);
|
|
|
|
$publicExponent->SetIntBuffer($PublicExponent);
|
|
|
|
$keySequenceItems = array($modulus, $publicExponent);
|
|
|
|
$keySequence = new ASNValue(ASNValue::TAG_SEQUENCE);
|
|
|
|
$keySequence->SetSequence($keySequenceItems);
|
|
|
|
//Encode bit string
|
|
|
|
$bitStringValue = $keySequence->Encode();
|
|
|
|
return $bitStringValue;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-07-26 04:57:17 +02:00
|
|
|
function metopem($m,$e) {
|
2011-07-29 03:16:57 +02:00
|
|
|
$der = pkcs8_encode($m,$e);
|
|
|
|
$key = DerToPem($der,false);
|
2011-07-26 04:57:17 +02:00
|
|
|
return $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-07-29 03:16:57 +02:00
|
|
|
function pubrsatome($key,&$m,&$e) {
|
|
|
|
require_once('library/asn1.php');
|
|
|
|
require_once('include/salmon.php');
|
|
|
|
|
|
|
|
$lines = explode("\n",$key);
|
|
|
|
unset($lines[0]);
|
|
|
|
unset($lines[count($lines)]);
|
|
|
|
$x = base64_decode(implode('',$lines));
|
|
|
|
|
|
|
|
$r = ASN_BASE::parseASNString($x);
|
|
|
|
|
|
|
|
$m = base64url_decode($r[0]->asnData[0]->asnData);
|
|
|
|
$e = base64url_decode($r[0]->asnData[1]->asnData);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
function rsatopem($key) {
|
|
|
|
pubrsatome($key,$m,$e);
|
|
|
|
return(metopem($m,$e));
|
|
|
|
}
|
|
|
|
|
2011-07-30 10:03:24 +02:00
|
|
|
function pemtorsa($key) {
|
|
|
|
pemtome($key,$m,$e);
|
|
|
|
return(metorsa($m,$e));
|
|
|
|
}
|
2011-07-29 03:16:57 +02:00
|
|
|
|
|
|
|
function pemtome($key,&$m,&$e) {
|
|
|
|
require_once('include/salmon.php');
|
|
|
|
$lines = explode("\n",$key);
|
|
|
|
unset($lines[0]);
|
|
|
|
unset($lines[count($lines)]);
|
|
|
|
$x = base64_decode(implode('',$lines));
|
|
|
|
|
|
|
|
$r = ASN_BASE::parseASNString($x);
|
|
|
|
|
|
|
|
$m = base64url_decode($r[0]->asnData[1]->asnData[0]->asnData[0]->asnData);
|
|
|
|
$e = base64url_decode($r[0]->asnData[1]->asnData[0]->asnData[1]->asnData);
|
|
|
|
}
|
|
|
|
|
|
|
|
function metorsa($m,$e) {
|
|
|
|
$der = pkcs1_encode($m,$e);
|
|
|
|
$key = DerToRsa($der);
|
|
|
|
return $key;
|
|
|
|
}
|
|
|
|
|
2011-08-10 03:55:46 +02:00
|
|
|
function salmon_key($pubkey) {
|
|
|
|
pemtome($pubkey,$m,$e);
|
|
|
|
return 'RSA' . '.' . base64url_encode($m,true) . '.' . base64url_encode($e,true) ;
|
|
|
|
}
|
2011-08-19 23:34:28 +02:00
|
|
|
|
|
|
|
|
2015-06-23 16:13:09 +02:00
|
|
|
|
2011-08-20 13:53:11 +02:00
|
|
|
if(! function_exists('aes_decrypt')) {
|
2015-06-23 16:13:09 +02:00
|
|
|
// DEPRECATED IN 3.4.1
|
2011-08-20 13:53:11 +02:00
|
|
|
function aes_decrypt($val,$ky)
|
|
|
|
{
|
|
|
|
$key="\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0";
|
|
|
|
for($a=0;$a<strlen($ky);$a++)
|
|
|
|
$key[$a%16]=chr(ord($key[$a%16]) ^ ord($ky[$a]));
|
|
|
|
$mode = MCRYPT_MODE_ECB;
|
|
|
|
$enc = MCRYPT_RIJNDAEL_128;
|
|
|
|
$dec = @mcrypt_decrypt($enc, $key, $val, $mode, @mcrypt_create_iv( @mcrypt_get_iv_size($enc, $mode), MCRYPT_DEV_URANDOM ) );
|
|
|
|
return rtrim($dec,(( ord(substr($dec,strlen($dec)-1,1))>=0 and ord(substr($dec, strlen($dec)-1,1))<=16)? chr(ord( substr($dec,strlen($dec)-1,1))):null));
|
|
|
|
}}
|
|
|
|
|
|
|
|
|
|
|
|
if(! function_exists('aes_encrypt')) {
|
2015-06-23 16:13:09 +02:00
|
|
|
// DEPRECATED IN 3.4.1
|
2011-08-20 13:53:11 +02:00
|
|
|
function aes_encrypt($val,$ky)
|
|
|
|
{
|
|
|
|
$key="\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0";
|
|
|
|
for($a=0;$a<strlen($ky);$a++)
|
|
|
|
$key[$a%16]=chr(ord($key[$a%16]) ^ ord($ky[$a]));
|
|
|
|
$mode=MCRYPT_MODE_ECB;
|
|
|
|
$enc=MCRYPT_RIJNDAEL_128;
|
|
|
|
$val=str_pad($val, (16*(floor(strlen($val) / 16)+(strlen($val) % 16==0?2:1))), chr(16-(strlen($val) % 16)));
|
|
|
|
return mcrypt_encrypt($enc, $key, $val, $mode, mcrypt_create_iv( mcrypt_get_iv_size($enc, $mode), MCRYPT_DEV_URANDOM));
|
|
|
|
}}
|
|
|
|
|
|
|
|
function pkcs5_pad ($text, $blocksize)
|
|
|
|
{
|
|
|
|
$pad = $blocksize - (strlen($text) % $blocksize);
|
|
|
|
return $text . str_repeat(chr($pad), $pad);
|
|
|
|
}
|
|
|
|
|
|
|
|
function pkcs5_unpad($text)
|
|
|
|
{
|
|
|
|
$pad = ord($text{strlen($text)-1});
|
|
|
|
if ($pad > strlen($text)) return false;
|
|
|
|
if (strspn($text, chr($pad), strlen($text) - $pad) != $pad) return false;
|
|
|
|
return substr($text, 0, -1 * $pad);
|
|
|
|
}
|
2011-08-28 03:09:43 +02:00
|
|
|
|
|
|
|
|
2012-05-21 03:30:02 +02:00
|
|
|
function new_keypair($bits) {
|
|
|
|
|
|
|
|
$openssl_options = array(
|
|
|
|
'digest_alg' => 'sha1',
|
|
|
|
'private_key_bits' => $bits,
|
|
|
|
'encrypt_key' => false
|
|
|
|
);
|
|
|
|
|
|
|
|
$conf = get_config('system','openssl_conf_file');
|
|
|
|
if($conf)
|
|
|
|
$openssl_options['config'] = $conf;
|
|
|
|
|
|
|
|
$result = openssl_pkey_new($openssl_options);
|
|
|
|
|
|
|
|
if(empty($result)) {
|
|
|
|
logger('new_keypair: failed');
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get private key
|
|
|
|
|
|
|
|
$response = array('prvkey' => '', 'pubkey' => '');
|
|
|
|
|
|
|
|
openssl_pkey_export($result, $response['prvkey']);
|
|
|
|
|
|
|
|
// Get public key
|
|
|
|
$pkey = openssl_pkey_get_details($result);
|
|
|
|
$response['pubkey'] = $pkey["key"];
|
|
|
|
|
|
|
|
return $response;
|
|
|
|
|
|
|
|
}
|
|
|
|
|