Add support for token strings in HTTPSignature::parseSigheader

- Only quoted strings were supported before
This commit is contained in:
Hypolite Petovan 2020-07-14 09:48:04 -04:00
parent 291f11a8bb
commit bf599be1f8

View file

@ -191,8 +191,10 @@ class HTTPSignature
/**
* @param string $header
* @return array associate array with
* @return array associative array with
* - \e string \b keyID
* - \e string \b created
* - \e string \b expires
* - \e string \b algorithm
* - \e array \b headers
* - \e string \b signature
@ -200,78 +202,55 @@ class HTTPSignature
*/
public static function parseSigheader($header)
{
$ret = [];
// Remove obsolete folds
$header = preg_replace('/\n\s+/', ' ', $header);
$token = "[!#$%&'*+.^_`|~0-9A-Za-z-]";
$quotedString = '"(?:\\\\.|[^"\\\\])*"';
$regex = "/($token+)=($quotedString|$token+)/ism";
$matches = [];
preg_match_all($regex, $header, $matches, PREG_SET_ORDER);
$headers = [];
foreach ($matches as $match) {
$headers[$match[1]] = trim($match[2] ?: $match[3], '"');
}
// if the header is encrypted, decrypt with (default) site private key and continue
if (preg_match('/iv="(.*?)"/ism', $header, $matches)) {
$header = self::decryptSigheader($header);
if (!empty($headers['iv'])) {
$header = self::decryptSigheader($headers, DI::config()->get('system', 'prvkey'));
return self::parseSigheader($header);
}
if (preg_match('/keyId="(.*?)"/ism', $header, $matches)) {
$ret['keyId'] = $matches[1];
$return = [
'keyId' => $headers['keyId'] ?? '',
'algorithm' => $headers['algorithm'] ?? 'rsa-sha256',
'created' => $headers['created'] ?? null,
'expires' => $headers['expires'] ?? null,
'headers' => explode(' ', $headers['headers'] ?? ''),
'signature' => base64_decode(preg_replace('/\s+/', '', $headers['signature'] ?? '')),
];
if (!empty($return['signature']) && !empty($return['algorithm']) && empty($return['headers'])) {
$return['headers'] = ['date'];
}
if (preg_match('/algorithm="(.*?)"/ism', $header, $matches)) {
$ret['algorithm'] = $matches[1];
} else {
$ret['algorithm'] = 'rsa-sha256';
}
if (preg_match('/headers="(.*?)"/ism', $header, $matches)) {
$ret['headers'] = explode(' ', $matches[1]);
}
if (preg_match('/signature="(.*?)"/ism', $header, $matches)) {
$ret['signature'] = base64_decode(preg_replace('/\s+/', '', $matches[1]));
}
if (!empty($ret['signature']) && !empty($ret['algorithm']) && empty($ret['headers'])) {
$ret['headers'] = ['date'];
}
return $ret;
return $return;
}
/**
* @param string $header
* @param string $prvkey (optional), if not set use site private key
*
* @return array|string associative array, empty string if failue
* - \e string \b iv
* - \e string \b key
* - \e string \b alg
* - \e string \b data
* @param array $headers Signature headers
* @param string $prvkey The site private key
* @return string Decrypted signature string
* @throws \Friendica\Network\HTTPException\InternalServerErrorException
*/
private static function decryptSigheader($header, $prvkey = null)
private static function decryptSigheader(array $headers, string $prvkey)
{
$iv = $key = $alg = $data = null;
if (!$prvkey) {
$prvkey = DI::config()->get('system', 'prvkey');
}
$matches = [];
if (preg_match('/iv="(.*?)"/ism', $header, $matches)) {
$iv = $matches[1];
}
if (preg_match('/key="(.*?)"/ism', $header, $matches)) {
$key = $matches[1];
}
if (preg_match('/alg="(.*?)"/ism', $header, $matches)) {
$alg = $matches[1];
}
if (preg_match('/data="(.*?)"/ism', $header, $matches)) {
$data = $matches[1];
}
if ($iv && $key && $alg && $data) {
return Crypto::unencapsulate(['iv' => $iv, 'key' => $key, 'alg' => $alg, 'data' => $data], $prvkey);
if (!empty($headers['iv']) && !empty($headers['key']) && !empty($headers['data'])) {
return Crypto::unencapsulate($headers, $prvkey);
}
return '';