<?php
/**
- * @file src/Util/Crypto.php
+ * @copyright Copyright (C) 2020, Friendica
+ *
+ * @license GNU AGPL version 3 or any later version
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU Affero General Public License as
+ * published by the Free Software Foundation, either version 3 of the
+ * License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Affero General Public License for more details.
+ *
+ * You should have received a copy of the GNU Affero General Public License
+ * along with this program. If not, see <https://www.gnu.org/licenses/>.
+ *
*/
+
namespace Friendica\Util;
-use Friendica\Core\Addon;
-use Friendica\Core\Config;
use ASN_BASE;
use ASNValue;
+use Friendica\Core\Hook;
+use Friendica\Core\Logger;
+use Friendica\Core\System;
+use Friendica\DI;
/**
- * @brief Crypto class
+ * Crypto class
*/
class Crypto
{
*/
public static function rsaSign($data, $key, $alg = 'sha256')
{
+ if (empty($key)) {
+ Logger::warning('Empty key parameter', ['callstack' => System::callstack()]);
+ }
openssl_sign($data, $sig, $key, (($alg == 'sha1') ? OPENSSL_ALGO_SHA1 : $alg));
return $sig;
}
*/
public static function rsaVerify($data, $sig, $key, $alg = 'sha256')
{
+ if (empty($key)) {
+ Logger::warning('Empty key parameter', ['callstack' => System::callstack()]);
+ }
return openssl_verify($data, $sig, $key, (($alg == 'sha1') ? OPENSSL_ALGO_SHA1 : $alg));
}
/**
* @param string $Der der formatted string
- * @param string $Private key type optional, default false
+ * @param bool $Private key type optional, default false
* @return string
*/
private static function DerToPem($Der, $Private = false)
* @param string $m modulo reference
* @param object $e exponent reference
* @return void
+ * @throws \Exception
*/
private static function pubRsaToMe($key, &$m, &$e)
{
$r = ASN_BASE::parseASNString($x);
- $m = base64url_decode($r[0]->asnData[0]->asnData);
- $e = base64url_decode($r[0]->asnData[1]->asnData);
+ $m = Strings::base64UrlDecode($r[0]->asnData[0]->asnData);
+ $e = Strings::base64UrlDecode($r[0]->asnData[1]->asnData);
}
/**
* @param string $key key
* @return string
+ * @throws \Exception
*/
public static function rsaToPem($key)
{
/**
* @param string $key key
* @return string
+ * @throws \Exception
*/
private static function pemToRsa($key)
{
* @param string $m modulo reference
* @param string $e exponent reference
* @return void
+ * @throws \Exception
*/
public static function pemToMe($key, &$m, &$e)
{
$r = ASN_BASE::parseASNString($x);
- $m = base64url_decode($r[0]->asnData[1]->asnData[0]->asnData[0]->asnData);
- $e = base64url_decode($r[0]->asnData[1]->asnData[0]->asnData[1]->asnData);
+ if (isset($r[0])) {
+ $m = Strings::base64UrlDecode($r[0]->asnData[1]->asnData[0]->asnData[0]->asnData);
+ $e = Strings::base64UrlDecode($r[0]->asnData[1]->asnData[0]->asnData[1]->asnData);
+ }
}
/**
/**
* @param integer $bits number of bits
* @return mixed
+ * @throws \Friendica\Network\HTTPException\InternalServerErrorException
*/
public static function newKeypair($bits)
{
'encrypt_key' => false
];
- $conf = Config::get('system', 'openssl_conf_file');
+ $conf = DI::config()->get('system', 'openssl_conf_file');
if ($conf) {
$openssl_options['config'] = $conf;
}
$result = openssl_pkey_new($openssl_options);
if (empty($result)) {
- logger('new_keypair: failed');
+ Logger::log('new_keypair: failed');
return false;
}
/**
* Encrypt a string with 'aes-256-cbc' cipher method.
*
+ * Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
+ *
* @param string $data
* @param string $key The key used for encryption.
* @param string $iv A non-NULL Initialization Vector.
/**
* Decrypt a string with 'aes-256-cbc' cipher method.
*
+ * Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
+ *
* @param string $data
* @param string $key The key used for decryption.
* @param string $iv A non-NULL Initialization Vector.
/**
* Encrypt a string with 'aes-256-ctr' cipher method.
*
+ * Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
+ *
* @param string $data
* @param string $key The key used for encryption.
* @param string $iv A non-NULL Initialization Vector.
}
/**
- * Decrypt a string with 'aes-256-cbc' cipher method.
+ * Decrypt a string with 'aes-256-ctr' cipher method.
+ *
+ * Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
*
* @param string $data
* @param string $key The key used for decryption.
}
/**
- *
+ *
+ * Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
+ *
* @param string $data
* @param string $pubkey The public key.
* @param string $alg The algorithm used for encryption.
- *
+ *
* @return array
+ * @throws \Exception
*/
public static function encapsulate($data, $pubkey, $alg = 'aes256cbc')
{
}
/**
- *
- * @param type $data
- * @param type $pubkey The public key.
- * @param type $alg The algorithm used for encryption.
- *
+ *
+ * Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
+ *
+ * @param string $data
+ * @param string $pubkey The public key.
+ * @param string $alg The algorithm used for encryption.
+ *
* @return array
+ * @throws \Exception
*/
private static function encapsulateOther($data, $pubkey, $alg)
{
if (!$pubkey) {
- logger('no key. data: '.$data);
+ Logger::log('no key. data: '.$data);
}
$fn = 'encrypt' . strtoupper($alg);
if (method_exists(__CLASS__, $fn)) {
- // A bit hesitant to use openssl_random_pseudo_bytes() as we know
- // it has been historically targeted by US agencies for 'weakening'.
- // It is still arguably better than trying to come up with an
- // alternative cryptographically secure random generator.
- // There is little point in using the optional second arg to flag the
- // assurance of security since it is meaningless if the source algorithms
- // have been compromised. Also none of this matters if RSA has been
- // compromised by state actors and evidence is mounting that this has
- // already happened.
$result = ['encrypted' => true];
- $key = openssl_random_pseudo_bytes(256);
- $iv = openssl_random_pseudo_bytes(256);
- $result['data'] = base64url_encode(self::$fn($data, $key, $iv), true);
+ $key = random_bytes(256);
+ $iv = random_bytes(256);
+ $result['data'] = Strings::base64UrlEncode(self::$fn($data, $key, $iv), true);
// log the offending call so we can track it down
if (!openssl_public_encrypt($key, $k, $pubkey)) {
$x = debug_backtrace();
- logger('RSA failed. ' . print_r($x[0], true));
+ Logger::log('RSA failed. ' . print_r($x[0], true));
}
$result['alg'] = $alg;
- $result['key'] = base64url_encode($k, true);
+ $result['key'] = Strings::base64UrlEncode($k, true);
openssl_public_encrypt($iv, $i, $pubkey);
- $result['iv'] = base64url_encode($i, true);
+ $result['iv'] = Strings::base64UrlEncode($i, true);
return $result;
} else {
$x = ['data' => $data, 'pubkey' => $pubkey, 'alg' => $alg, 'result' => $data];
- Addon::callHooks('other_encapsulate', $x);
+ Hook::callAll('other_encapsulate', $x);
return $x['result'];
}
}
/**
- *
+ *
+ * Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
+ *
* @param string $data
* @param string $pubkey
- *
+ *
* @return array
+ * @throws \Exception
*/
private static function encapsulateAes($data, $pubkey)
{
if (!$pubkey) {
- logger('aes_encapsulate: no key. data: ' . $data);
+ Logger::log('aes_encapsulate: no key. data: ' . $data);
}
- $key = openssl_random_pseudo_bytes(32);
- $iv = openssl_random_pseudo_bytes(16);
+ $key = random_bytes(32);
+ $iv = random_bytes(16);
$result = ['encrypted' => true];
- $result['data'] = base64url_encode(AES256CBC_encrypt($data, $key, $iv), true);
+ $result['data'] = Strings::base64UrlEncode(self::encryptAES256CBC($data, $key, $iv), true);
// log the offending call so we can track it down
if (!openssl_public_encrypt($key, $k, $pubkey)) {
$x = debug_backtrace();
- logger('aes_encapsulate: RSA failed. ' . print_r($x[0], true));
+ Logger::log('aes_encapsulate: RSA failed. ' . print_r($x[0], true));
}
$result['alg'] = 'aes256cbc';
- $result['key'] = base64url_encode($k, true);
+ $result['key'] = Strings::base64UrlEncode($k, true);
openssl_public_encrypt($iv, $i, $pubkey);
- $result['iv'] = base64url_encode($i, true);
+ $result['iv'] = Strings::base64UrlEncode($i, true);
return $result;
}
/**
- *
- * @param string $data
- * @param string $prvkey The private key used for decryption.
- *
+ *
+ * Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
+ *
+ * @param array $data ['iv' => $iv, 'key' => $key, 'alg' => $alg, 'data' => $data]
+ * @param string $prvkey The private key used for decryption.
+ *
* @return string|boolean The decrypted string or false on failure.
+ * @throws \Exception
*/
- public static function unencapsulate($data, $prvkey)
+ public static function unencapsulate(array $data, $prvkey)
{
if (!$data) {
return;
$alg = ((array_key_exists('alg', $data)) ? $data['alg'] : 'aes256cbc');
if ($alg === 'aes256cbc') {
- return self::encapsulateAes($data, $prvkey);
+ return self::encapsulateAes($data['data'], $prvkey);
}
- return self::encapsulateOther($data, $prvkey, $alg);
+ return self::encapsulateOther($data['data'], $prvkey, $alg);
}
/**
- *
- * @param string $data
- * @param string $prvkey The private key used for decryption.
+ *
+ * Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
+ *
+ * @param array $data
+ * @param string $prvkey The private key used for decryption.
* @param string $alg
- *
+ *
* @return string|boolean The decrypted string or false on failure.
+ * @throws \Friendica\Network\HTTPException\InternalServerErrorException
*/
- private static function unencapsulateOther($data, $prvkey, $alg)
+ private static function unencapsulateOther(array $data, $prvkey, $alg)
{
$fn = 'decrypt' . strtoupper($alg);
if (method_exists(__CLASS__, $fn)) {
- openssl_private_decrypt(base64url_decode($data['key']), $k, $prvkey);
- openssl_private_decrypt(base64url_decode($data['iv']), $i, $prvkey);
+ openssl_private_decrypt(Strings::base64UrlDecode($data['key']), $k, $prvkey);
+ openssl_private_decrypt(Strings::base64UrlDecode($data['iv']), $i, $prvkey);
- return self::$fn(base64url_decode($data['data']), $k, $i);
+ return self::$fn(Strings::base64UrlDecode($data['data']), $k, $i);
} else {
$x = ['data' => $data, 'prvkey' => $prvkey, 'alg' => $alg, 'result' => $data];
- Addon::callHooks('other_unencapsulate', $x);
+ Hook::callAll('other_unencapsulate', $x);
return $x['result'];
}
}
/**
- *
+ *
+ * Ported from Hubzilla: https://framagit.org/hubzilla/core/blob/master/include/crypto.php
+ *
* @param array $data
- * @param string $prvkey The private key used for decryption.
- *
+ * @param string $prvkey The private key used for decryption.
+ *
* @return string|boolean The decrypted string or false on failure.
+ * @throws \Exception
*/
private static function unencapsulateAes($data, $prvkey)
{
- openssl_private_decrypt(base64url_decode($data['key']), $k, $prvkey);
- openssl_private_decrypt(base64url_decode($data['iv']), $i, $prvkey);
+ openssl_private_decrypt(Strings::base64UrlDecode($data['key']), $k, $prvkey);
+ openssl_private_decrypt(Strings::base64UrlDecode($data['iv']), $i, $prvkey);
+
+ return self::decryptAES256CBC(Strings::base64UrlDecode($data['data']), $k, $i);
+ }
+
+
+ /**
+ * Creates cryptographic secure random digits
+ *
+ * @param string $digits The count of digits
+ * @return int The random Digits
+ *
+ * @throws \Exception In case 'random_int' isn't usable
+ */
+ public static function randomDigits($digits)
+ {
+ $rn = '';
+
+ // generating cryptographically secure pseudo-random integers
+ for ($i = 0; $i < $digits; $i++) {
+ $rn .= random_int(0, 9);
+ }
- return self::decryptAES256CBC(base64url_decode($data['data']), $k, $i);
+ return $rn;
}
}