. * * @package StatusNet * @author James Walker * @copyright 2010 StatusNet, Inc. * @license http://www.fsf.org/licensing/licenses/agpl-3.0.html AGPL 3.0 * @link http://status.net/ */ require_once 'Crypt/RSA.php'; class Magicsig extends Memcached_DataObject { const PUBLICKEYREL = 'magic-public-key'; public $__table = 'magicsig'; public $user_id; public $keypair; public $alg; public $publicKey; public $privateKey; public function __construct($alg = 'RSA-SHA256') { $this->alg = $alg; } public /*static*/ function staticGet($k, $v=null) { $obj = parent::staticGet(__CLASS__, $k, $v); if (!empty($obj)) { $obj = Magicsig::fromString($obj->keypair); // Double check keys: Crypt_RSA did not // consistently generate good keypairs. // We've also moved to 1024 bit keys. if (strlen($obj->publicKey->modulus->toBits()) != 1024) { $obj->delete(); return false; } } return $obj; } function table() { return array( 'user_id' => DB_DATAOBJECT_INT, 'keypair' => DB_DATAOBJECT_STR + DB_DATAOBJECT_NOTNULL, 'alg' => DB_DATAOBJECT_STR ); } static function schemaDef() { return array(new ColumnDef('user_id', 'integer', null, false, 'PRI'), new ColumnDef('keypair', 'text', false, false), new ColumnDef('alg', 'varchar', 64, false)); } function keys() { return array_keys($this->keyTypes()); } function keyTypes() { return array('user_id' => 'K'); } function sequenceKey() { return array(false, false, false); } function insert() { $this->keypair = $this->toString(); return parent::insert(); } public function generate($user_id) { $rsa = new Crypt_RSA(); $keypair = $rsa->createKey(); $rsa->loadKey($keypair['privatekey']); $this->privateKey = new Crypt_RSA(); $this->privateKey->loadKey($keypair['privatekey']); $this->publicKey = new Crypt_RSA(); $this->publicKey->loadKey($keypair['publickey']); $this->user_id = $user_id; $this->insert(); } public function toString($full_pair = true) { $mod = Magicsig::base64_url_encode($this->publicKey->modulus->toBytes()); $exp = Magicsig::base64_url_encode($this->publicKey->exponent->toBytes()); $private_exp = ''; if ($full_pair && $this->privateKey->exponent->toBytes()) { $private_exp = '.' . Magicsig::base64_url_encode($this->privateKey->exponent->toBytes()); } return 'RSA.' . $mod . '.' . $exp . $private_exp; } public static function fromString($text) { $magic_sig = new Magicsig(); // remove whitespace $text = preg_replace('/\s+/', '', $text); // parse components if (!preg_match('/RSA\.([^\.]+)\.([^\.]+)(.([^\.]+))?/', $text, $matches)) { return false; } $mod = $matches[1]; $exp = $matches[2]; if (!empty($matches[4])) { $private_exp = $matches[4]; } else { $private_exp = false; } $magic_sig->loadKey($mod, $exp, 'public'); if ($private_exp) { $magic_sig->loadKey($mod, $private_exp, 'private'); } return $magic_sig; } public function loadKey($mod, $exp, $type = 'public') { common_log(LOG_DEBUG, "Adding ".$type." key: (".$mod .', '. $exp .")"); $rsa = new Crypt_RSA(); $rsa->signatureMode = CRYPT_RSA_SIGNATURE_PKCS1; $rsa->setHash('sha256'); $rsa->modulus = new Math_BigInteger(Magicsig::base64_url_decode($mod), 256); $rsa->k = strlen($rsa->modulus->toBytes()); $rsa->exponent = new Math_BigInteger(Magicsig::base64_url_decode($exp), 256); if ($type == 'private') { $this->privateKey = $rsa; } else { $this->publicKey = $rsa; } } public function getName() { return $this->alg; } public function getHash() { switch ($this->alg) { case 'RSA-SHA256': return 'sha256'; } } public function sign($bytes) { $sig = $this->privateKey->sign($bytes); return Magicsig::base64_url_encode($sig); } public function verify($signed_bytes, $signature) { $signature = Magicsig::base64_url_decode($signature); return $this->publicKey->verify($signed_bytes, $signature); } public static function base64_url_encode($input) { return strtr(base64_encode($input), '+/', '-_'); } public static function base64_url_decode($input) { return base64_decode(strtr($input, '-_', '+/')); } }