2017-12-30 17:51:49 +01:00
|
|
|
<?php
|
|
|
|
/**
|
2021-03-29 08:40:20 +02:00
|
|
|
* @copyright Copyright (C) 2010-2021, the Friendica project
|
2020-02-09 16:18:46 +01:00
|
|
|
*
|
|
|
|
* @license GNU AGPL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*
|
2017-12-30 17:51:49 +01:00
|
|
|
*/
|
2020-02-09 16:18:46 +01:00
|
|
|
|
2017-12-30 17:51:49 +01:00
|
|
|
namespace Friendica\Util;
|
|
|
|
|
2021-08-15 08:45:48 +02:00
|
|
|
use Exception;
|
2018-12-26 07:06:24 +01:00
|
|
|
use Friendica\Core\Hook;
|
2018-10-29 22:20:46 +01:00
|
|
|
use Friendica\Core\Logger;
|
2019-03-03 08:05:57 +01:00
|
|
|
use Friendica\Core\System;
|
2020-01-19 21:26:42 +01:00
|
|
|
use Friendica\DI;
|
2021-08-15 02:30:41 +02:00
|
|
|
use ParagonIE\ConstantTime\Base64UrlSafe;
|
2020-09-12 11:57:37 +02:00
|
|
|
use phpseclib\Crypt\RSA;
|
2020-09-12 20:54:37 +02:00
|
|
|
use phpseclib\Math\BigInteger;
|
2017-12-30 17:51:49 +01:00
|
|
|
|
|
|
|
/**
|
2020-01-19 07:05:23 +01:00
|
|
|
* Crypto class
|
2017-12-30 17:51:49 +01:00
|
|
|
*/
|
|
|
|
class Crypto
|
|
|
|
{
|
|
|
|
// supported algorithms are 'sha256', 'sha1'
|
|
|
|
/**
|
|
|
|
* @param string $data data
|
|
|
|
* @param string $key key
|
|
|
|
* @param string $alg algorithm
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public static function rsaSign($data, $key, $alg = 'sha256')
|
|
|
|
{
|
2019-03-03 08:01:11 +01:00
|
|
|
if (empty($key)) {
|
2019-03-04 07:52:43 +01:00
|
|
|
Logger::warning('Empty key parameter', ['callstack' => System::callstack()]);
|
2019-03-03 08:01:11 +01:00
|
|
|
}
|
2017-12-30 17:51:49 +01:00
|
|
|
openssl_sign($data, $sig, $key, (($alg == 'sha1') ? OPENSSL_ALGO_SHA1 : $alg));
|
|
|
|
return $sig;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $data data
|
|
|
|
* @param string $sig signature
|
|
|
|
* @param string $key key
|
|
|
|
* @param string $alg algorithm
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public static function rsaVerify($data, $sig, $key, $alg = 'sha256')
|
|
|
|
{
|
2019-03-03 08:01:11 +01:00
|
|
|
if (empty($key)) {
|
2019-03-04 07:52:43 +01:00
|
|
|
Logger::warning('Empty key parameter', ['callstack' => System::callstack()]);
|
2019-03-03 08:01:11 +01:00
|
|
|
}
|
2017-12-30 17:51:49 +01:00
|
|
|
return openssl_verify($data, $sig, $key, (($alg == 'sha1') ? OPENSSL_ALGO_SHA1 : $alg));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
/**
|
|
|
|
* @param string $m modulo
|
|
|
|
* @param string $e exponent
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public static function meToPem($m, $e)
|
|
|
|
{
|
2020-09-12 20:54:37 +02:00
|
|
|
$rsa = new RSA();
|
2020-09-14 06:34:03 +02:00
|
|
|
$rsa->loadKey([
|
|
|
|
'e' => new BigInteger($e, 256),
|
|
|
|
'n' => new BigInteger($m, 256)
|
|
|
|
]);
|
2020-09-12 20:54:37 +02:00
|
|
|
return $rsa->getPublicKey();
|
2017-12-30 17:51:49 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-09-12 11:57:37 +02:00
|
|
|
* Transform RSA public keys to standard PEM output
|
|
|
|
*
|
|
|
|
* @param string $key A RSA public key
|
|
|
|
*
|
|
|
|
* @return string The PEM output of this key
|
2017-12-30 17:51:49 +01:00
|
|
|
*/
|
2020-09-12 11:57:37 +02:00
|
|
|
public static function rsaToPem(string $key)
|
2017-12-30 17:51:49 +01:00
|
|
|
{
|
2020-09-13 10:53:15 +02:00
|
|
|
$rsa = new RSA();
|
|
|
|
$rsa->setPublicKey($key);
|
2017-12-30 17:51:49 +01:00
|
|
|
|
2020-09-13 10:53:15 +02:00
|
|
|
return $rsa->getPublicKey(RSA::PUBLIC_FORMAT_PKCS8);
|
2017-12-30 17:51:49 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-09-12 11:57:37 +02:00
|
|
|
* Extracts the modulo and exponent reference from a public PEM key
|
|
|
|
*
|
|
|
|
* @param string $key public PEM key
|
|
|
|
* @param string $modulus (ref) modulo reference
|
|
|
|
* @param string $exponent (ref) exponent reference
|
|
|
|
*
|
2017-12-30 17:51:49 +01:00
|
|
|
* @return void
|
|
|
|
*/
|
2020-09-12 20:54:37 +02:00
|
|
|
public static function pemToMe(string $key, &$modulus, &$exponent)
|
2017-12-30 17:51:49 +01:00
|
|
|
{
|
2020-09-13 10:53:15 +02:00
|
|
|
$rsa = new RSA();
|
|
|
|
$rsa->loadKey($key);
|
|
|
|
$rsa->setPublicKey();
|
2017-12-30 17:51:49 +01:00
|
|
|
|
2020-09-13 10:53:15 +02:00
|
|
|
$modulus = $rsa->modulus->toBytes();
|
|
|
|
$exponent = $rsa->exponent->toBytes();
|
2017-12-30 17:51:49 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param integer $bits number of bits
|
|
|
|
* @return mixed
|
2019-01-06 22:06:53 +01:00
|
|
|
* @throws \Friendica\Network\HTTPException\InternalServerErrorException
|
2017-12-30 17:51:49 +01:00
|
|
|
*/
|
|
|
|
public static function newKeypair($bits)
|
|
|
|
{
|
2018-01-15 14:05:12 +01:00
|
|
|
$openssl_options = [
|
2017-12-30 17:51:49 +01:00
|
|
|
'digest_alg' => 'sha1',
|
|
|
|
'private_key_bits' => $bits,
|
|
|
|
'encrypt_key' => false
|
2018-01-15 14:05:12 +01:00
|
|
|
];
|
2017-12-30 17:51:49 +01:00
|
|
|
|
2020-01-19 21:21:13 +01:00
|
|
|
$conf = DI::config()->get('system', 'openssl_conf_file');
|
2017-12-30 17:51:49 +01:00
|
|
|
if ($conf) {
|
|
|
|
$openssl_options['config'] = $conf;
|
|
|
|
}
|
|
|
|
$result = openssl_pkey_new($openssl_options);
|
|
|
|
|
|
|
|
if (empty($result)) {
|
2021-10-20 20:53:52 +02:00
|
|
|
Logger::notice('new_keypair: failed');
|
2017-12-30 17:51:49 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get private key
|
2018-01-15 14:05:12 +01:00
|
|
|
$response = ['prvkey' => '', 'pubkey' => ''];
|
2017-12-30 17:51:49 +01:00
|
|
|
|
|
|
|
openssl_pkey_export($result, $response['prvkey']);
|
|
|
|
|
|
|
|
// Get public key
|
|
|
|
$pkey = openssl_pkey_get_details($result);
|
|
|
|
$response['pubkey'] = $pkey["key"];
|
|
|
|
|
|
|
|
return $response;
|
|
|
|
}
|
2018-06-18 23:05:44 +02:00
|
|
|
|
2021-08-15 02:30:41 +02:00
|
|
|
/**
|
|
|
|
* Create a new elliptic curve key pair
|
|
|
|
*
|
2021-08-15 14:57:29 +02:00
|
|
|
* @return array with the elements "prvkey", "pubkey", "vapid-public" and "vapid-private"
|
2021-08-15 02:30:41 +02:00
|
|
|
*/
|
|
|
|
public static function newECKeypair()
|
|
|
|
{
|
|
|
|
$openssl_options = [
|
|
|
|
'curve_name' => 'prime256v1',
|
|
|
|
'private_key_type' => OPENSSL_KEYTYPE_EC
|
|
|
|
];
|
|
|
|
|
|
|
|
$conf = DI::config()->get('system', 'openssl_conf_file');
|
|
|
|
if ($conf) {
|
|
|
|
$openssl_options['config'] = $conf;
|
|
|
|
}
|
|
|
|
$result = openssl_pkey_new($openssl_options);
|
|
|
|
|
|
|
|
if (empty($result)) {
|
2021-08-15 08:45:48 +02:00
|
|
|
throw new Exception('Key creation failed');
|
2021-08-15 02:30:41 +02:00
|
|
|
}
|
|
|
|
|
2021-08-15 14:57:29 +02:00
|
|
|
$response = ['prvkey' => '', 'pubkey' => ''];
|
2021-08-15 02:30:41 +02:00
|
|
|
|
|
|
|
// Get private key
|
|
|
|
openssl_pkey_export($result, $response['prvkey']);
|
|
|
|
|
|
|
|
// Get public key
|
|
|
|
$pkey = openssl_pkey_get_details($result);
|
|
|
|
$response['pubkey'] = $pkey['key'];
|
|
|
|
|
2021-08-15 14:57:29 +02:00
|
|
|
// Create VAPID keys
|
2021-08-15 02:30:41 +02:00
|
|
|
// @see https://github.com/web-push-libs/web-push-php/blob/256a18b2a2411469c94943725fb6eccb9681bd75/src/Utils.php#L60-L62
|
|
|
|
$hexString = '04';
|
|
|
|
$hexString .= str_pad(bin2hex($pkey['ec']['x']), 64, '0', STR_PAD_LEFT);
|
|
|
|
$hexString .= str_pad(bin2hex($pkey['ec']['y']), 64, '0', STR_PAD_LEFT);
|
2021-08-15 14:57:29 +02:00
|
|
|
$response['vapid-public'] = Base64UrlSafe::encode(hex2bin($hexString));
|
|
|
|
|
|
|
|
// @see https://github.com/web-push-libs/web-push-php/blob/256a18b2a2411469c94943725fb6eccb9681bd75/src/VAPID.php
|
|
|
|
$response['vapid-private'] = Base64UrlSafe::encode(hex2bin(str_pad(bin2hex($pkey['ec']['d']), 64, '0', STR_PAD_LEFT)));
|
2021-08-15 02:30:41 +02:00
|
|
|
|
|
|
|
return $response;
|
|
|
|
}
|
|
|
|
|
2018-06-18 23:05:44 +02:00
|
|
|
/**
|
|
|
|
* Encrypt a string with 'aes-256-cbc' cipher method.
|
2020-09-13 10:53:15 +02:00
|
|
|
*
|
2018-06-19 13:30:55 +02:00
|
|
|
* Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
|
2020-09-13 10:53:15 +02:00
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @param string $data
|
|
|
|
* @param string $key The key used for encryption.
|
|
|
|
* @param string $iv A non-NULL Initialization Vector.
|
2020-09-13 10:53:15 +02:00
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @return string|boolean Encrypted string or false on failure.
|
|
|
|
*/
|
|
|
|
private static function encryptAES256CBC($data, $key, $iv)
|
|
|
|
{
|
|
|
|
return openssl_encrypt($data, 'aes-256-cbc', str_pad($key, 32, "\0"), OPENSSL_RAW_DATA, str_pad($iv, 16, "\0"));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decrypt a string with 'aes-256-cbc' cipher method.
|
2020-09-13 10:53:15 +02:00
|
|
|
*
|
2018-06-19 13:30:55 +02:00
|
|
|
* Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
|
2020-09-13 10:53:15 +02:00
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @param string $data
|
|
|
|
* @param string $key The key used for decryption.
|
|
|
|
* @param string $iv A non-NULL Initialization Vector.
|
2020-09-13 10:53:15 +02:00
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @return string|boolean Decrypted string or false on failure.
|
|
|
|
*/
|
|
|
|
private static function decryptAES256CBC($data, $key, $iv)
|
|
|
|
{
|
|
|
|
return openssl_decrypt($data, 'aes-256-cbc', str_pad($key, 32, "\0"), OPENSSL_RAW_DATA, str_pad($iv, 16, "\0"));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2018-06-19 13:30:55 +02:00
|
|
|
* Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @param string $data
|
|
|
|
* @param string $pubkey The public key.
|
|
|
|
* @param string $alg The algorithm used for encryption.
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @return array
|
2019-01-06 22:06:53 +01:00
|
|
|
* @throws \Exception
|
2018-06-18 23:05:44 +02:00
|
|
|
*/
|
|
|
|
public static function encapsulate($data, $pubkey, $alg = 'aes256cbc')
|
|
|
|
{
|
|
|
|
if ($alg === 'aes256cbc') {
|
|
|
|
return self::encapsulateAes($data, $pubkey);
|
|
|
|
}
|
|
|
|
return self::encapsulateOther($data, $pubkey, $alg);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2018-06-19 13:30:55 +02:00
|
|
|
* Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
|
|
|
* @param string $data
|
|
|
|
* @param string $pubkey The public key.
|
|
|
|
* @param string $alg The algorithm used for encryption.
|
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @return array
|
2019-01-06 22:06:53 +01:00
|
|
|
* @throws \Exception
|
2018-06-18 23:05:44 +02:00
|
|
|
*/
|
|
|
|
private static function encapsulateOther($data, $pubkey, $alg)
|
|
|
|
{
|
|
|
|
if (!$pubkey) {
|
2021-10-20 20:53:52 +02:00
|
|
|
Logger::notice('no key. data: '.$data);
|
2018-06-18 23:05:44 +02:00
|
|
|
}
|
|
|
|
$fn = 'encrypt' . strtoupper($alg);
|
|
|
|
if (method_exists(__CLASS__, $fn)) {
|
|
|
|
$result = ['encrypted' => true];
|
2018-06-20 18:45:37 +02:00
|
|
|
$key = random_bytes(256);
|
|
|
|
$iv = random_bytes(256);
|
2018-11-08 16:37:08 +01:00
|
|
|
$result['data'] = Strings::base64UrlEncode(self::$fn($data, $key, $iv), true);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
|
|
|
// log the offending call so we can track it down
|
|
|
|
if (!openssl_public_encrypt($key, $k, $pubkey)) {
|
|
|
|
$x = debug_backtrace();
|
2020-06-29 22:22:00 +02:00
|
|
|
Logger::notice('RSA failed', ['trace' => $x[0]]);
|
2018-06-18 23:05:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
$result['alg'] = $alg;
|
2018-11-08 16:37:08 +01:00
|
|
|
$result['key'] = Strings::base64UrlEncode($k, true);
|
2018-06-18 23:05:44 +02:00
|
|
|
openssl_public_encrypt($iv, $i, $pubkey);
|
2018-11-08 16:37:08 +01:00
|
|
|
$result['iv'] = Strings::base64UrlEncode($i, true);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
|
|
|
return $result;
|
|
|
|
} else {
|
|
|
|
$x = ['data' => $data, 'pubkey' => $pubkey, 'alg' => $alg, 'result' => $data];
|
2018-12-26 07:06:24 +01:00
|
|
|
Hook::callAll('other_encapsulate', $x);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
|
|
|
return $x['result'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2018-06-19 13:30:55 +02:00
|
|
|
* Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @param string $data
|
|
|
|
* @param string $pubkey
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @return array
|
2019-01-06 22:06:53 +01:00
|
|
|
* @throws \Exception
|
2018-06-18 23:05:44 +02:00
|
|
|
*/
|
|
|
|
private static function encapsulateAes($data, $pubkey)
|
|
|
|
{
|
|
|
|
if (!$pubkey) {
|
2021-10-20 20:53:52 +02:00
|
|
|
Logger::notice('aes_encapsulate: no key. data: ' . $data);
|
2018-06-18 23:05:44 +02:00
|
|
|
}
|
|
|
|
|
2018-06-20 18:45:37 +02:00
|
|
|
$key = random_bytes(32);
|
|
|
|
$iv = random_bytes(16);
|
2018-06-18 23:05:44 +02:00
|
|
|
$result = ['encrypted' => true];
|
2018-11-08 16:37:08 +01:00
|
|
|
$result['data'] = Strings::base64UrlEncode(self::encryptAES256CBC($data, $key, $iv), true);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
|
|
|
// log the offending call so we can track it down
|
|
|
|
if (!openssl_public_encrypt($key, $k, $pubkey)) {
|
|
|
|
$x = debug_backtrace();
|
2021-10-20 20:53:52 +02:00
|
|
|
Logger::notice('aes_encapsulate: RSA failed.', ['data' => $x[0]]);
|
2018-06-18 23:05:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
$result['alg'] = 'aes256cbc';
|
2018-11-08 16:37:08 +01:00
|
|
|
$result['key'] = Strings::base64UrlEncode($k, true);
|
2018-06-18 23:05:44 +02:00
|
|
|
openssl_public_encrypt($iv, $i, $pubkey);
|
2018-11-08 16:37:08 +01:00
|
|
|
$result['iv'] = Strings::base64UrlEncode($i, true);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2018-06-19 13:30:55 +02:00
|
|
|
* Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2019-01-21 22:05:03 +01:00
|
|
|
* @param array $data ['iv' => $iv, 'key' => $key, 'alg' => $alg, 'data' => $data]
|
2019-01-06 22:06:53 +01:00
|
|
|
* @param string $prvkey The private key used for decryption.
|
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @return string|boolean The decrypted string or false on failure.
|
2019-01-06 22:06:53 +01:00
|
|
|
* @throws \Exception
|
2018-06-18 23:05:44 +02:00
|
|
|
*/
|
2019-01-21 22:05:03 +01:00
|
|
|
public static function unencapsulate(array $data, $prvkey)
|
2018-06-18 23:05:44 +02:00
|
|
|
{
|
|
|
|
if (!$data) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-07-14 15:35:06 +02:00
|
|
|
$alg = $data['alg'] ?? 'aes256cbc';
|
2018-06-18 23:05:44 +02:00
|
|
|
if ($alg === 'aes256cbc') {
|
2020-07-14 15:35:06 +02:00
|
|
|
return self::unencapsulateAes($data['data'], $prvkey);
|
2018-06-18 23:05:44 +02:00
|
|
|
}
|
2020-07-14 15:35:06 +02:00
|
|
|
|
|
|
|
return self::unencapsulateOther($data, $prvkey, $alg);
|
2018-06-18 23:05:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2018-06-19 13:30:55 +02:00
|
|
|
* Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2019-01-21 22:05:03 +01:00
|
|
|
* @param array $data
|
2019-01-06 22:06:53 +01:00
|
|
|
* @param string $prvkey The private key used for decryption.
|
2018-06-18 23:05:44 +02:00
|
|
|
* @param string $alg
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @return string|boolean The decrypted string or false on failure.
|
2019-01-06 22:06:53 +01:00
|
|
|
* @throws \Friendica\Network\HTTPException\InternalServerErrorException
|
2018-06-18 23:05:44 +02:00
|
|
|
*/
|
2019-01-21 22:05:03 +01:00
|
|
|
private static function unencapsulateOther(array $data, $prvkey, $alg)
|
2018-06-18 23:05:44 +02:00
|
|
|
{
|
|
|
|
$fn = 'decrypt' . strtoupper($alg);
|
|
|
|
|
|
|
|
if (method_exists(__CLASS__, $fn)) {
|
2018-11-08 16:37:08 +01:00
|
|
|
openssl_private_decrypt(Strings::base64UrlDecode($data['key']), $k, $prvkey);
|
|
|
|
openssl_private_decrypt(Strings::base64UrlDecode($data['iv']), $i, $prvkey);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
2018-11-08 16:37:08 +01:00
|
|
|
return self::$fn(Strings::base64UrlDecode($data['data']), $k, $i);
|
2018-06-18 23:05:44 +02:00
|
|
|
} else {
|
|
|
|
$x = ['data' => $data, 'prvkey' => $prvkey, 'alg' => $alg, 'result' => $data];
|
2018-12-26 07:06:24 +01:00
|
|
|
Hook::callAll('other_unencapsulate', $x);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
|
|
|
return $x['result'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2018-06-19 13:30:55 +02:00
|
|
|
* Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
|
2019-01-06 22:06:53 +01:00
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @param array $data
|
2019-01-06 22:06:53 +01:00
|
|
|
* @param string $prvkey The private key used for decryption.
|
|
|
|
*
|
2018-06-18 23:05:44 +02:00
|
|
|
* @return string|boolean The decrypted string or false on failure.
|
2019-01-06 22:06:53 +01:00
|
|
|
* @throws \Exception
|
2018-06-18 23:05:44 +02:00
|
|
|
*/
|
|
|
|
private static function unencapsulateAes($data, $prvkey)
|
|
|
|
{
|
2018-11-08 16:37:08 +01:00
|
|
|
openssl_private_decrypt(Strings::base64UrlDecode($data['key']), $k, $prvkey);
|
|
|
|
openssl_private_decrypt(Strings::base64UrlDecode($data['iv']), $i, $prvkey);
|
2018-06-18 23:05:44 +02:00
|
|
|
|
2018-11-08 16:37:08 +01:00
|
|
|
return self::decryptAES256CBC(Strings::base64UrlDecode($data['data']), $k, $i);
|
2018-06-18 23:05:44 +02:00
|
|
|
}
|
2018-11-05 09:37:03 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Creates cryptographic secure random digits
|
|
|
|
*
|
|
|
|
* @param string $digits The count of digits
|
|
|
|
* @return int The random Digits
|
2018-11-05 21:15:30 +01:00
|
|
|
*
|
|
|
|
* @throws \Exception In case 'random_int' isn't usable
|
2018-11-05 09:37:03 +01:00
|
|
|
*/
|
|
|
|
public static function randomDigits($digits)
|
|
|
|
{
|
|
|
|
$rn = '';
|
|
|
|
|
2018-11-05 21:15:30 +01:00
|
|
|
// generating cryptographically secure pseudo-random integers
|
|
|
|
for ($i = 0; $i < $digits; $i++) {
|
|
|
|
$rn .= random_int(0, 9);
|
2018-11-05 09:37:03 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return $rn;
|
|
|
|
}
|
2017-12-30 17:51:49 +01:00
|
|
|
}
|