gnu-social/plugins/OStatus/classes/Magicsig.php

291 lines
7.9 KiB
PHP
Raw Normal View History

2010-02-22 23:05:32 +09:00
<?php
/**
* StatusNet - the distributed open-source microblogging tool
* Copyright (C) 2010, StatusNet, Inc.
*
* A sample module to show best practices for StatusNet plugins
*
* PHP version 5
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
* @package StatusNet
* @author James Walker <james@status.net>
* @copyright 2010 StatusNet, Inc.
* @license http://www.fsf.org/licensing/licenses/agpl-3.0.html AGPL 3.0
* @link http://status.net/
*/
if (!defined('STATUSNET')) {
exit(1);
}
2010-03-25 04:26:03 +09:00
require_once 'Crypt/RSA.php';
class Magicsig extends Managed_DataObject
2010-02-22 23:05:32 +09:00
{
const PUBLICKEYREL = 'magic-public-key';
public $__table = 'magicsig';
/**
* Key to user.id/profile.id for the local user whose key we're storing.
*
* @var int
*/
public $user_id;
/**
* Flattened string representation of the key pair; callers should
* usually use $this->publicKey and $this->privateKey directly,
* which hold live Crypt_RSA key objects.
*
* @var string
*/
2010-02-22 23:05:32 +09:00
public $keypair;
/**
* Crypto algorithm used for this key; currently only RSA-SHA256 is supported.
*
* @var string
*/
public $alg;
/**
* Public RSA key; gets serialized in/out via $this->keypair string.
*
* @var Crypt_RSA
*/
2010-03-13 11:44:18 +09:00
public $publicKey;
/**
* PrivateRSA key; gets serialized in/out via $this->keypair string.
*
* @var Crypt_RSA
*/
2010-03-13 11:44:18 +09:00
public $privateKey;
public function __construct($alg = 'RSA-SHA256')
{
$this->alg = $alg;
}
public static function schemaDef()
2010-02-22 23:05:32 +09:00
{
return array(
'fields' => array(
'user_id' => array('type' => 'int', 'not null' => true, 'description' => 'user id'),
'keypair' => array('type' => 'text', 'description' => 'keypair text representation', 'collate' => 'utf8_general_ci'),
'alg' => array('type' => 'varchar', 'length' => 64, 'description' => 'algorithm'),
),
'primary key' => array('user_id'),
'foreign keys' => array(
'magicsig_user_id_fkey' => array('user', array('user_id' => 'id')),
),
);
2010-02-22 23:05:32 +09:00
}
/**
* Save this keypair into the database.
*
* Overloads default insert behavior to encode the live key objects
* as a flat string for storage.
*
* @return mixed
*/
function insert()
{
$this->keypair = $this->toString();
return parent::insert();
}
2010-02-23 13:30:05 +09:00
/**
* Generate a new keypair for a local user and store in the database.
*
* Warning: this can be very slow on systems without the GMP module.
* Runtimes of 20-30 seconds are not unheard-of.
*
* @param int $user_id id of local user we're creating a key for
*/
2010-03-13 11:44:18 +09:00
public function generate($user_id)
2010-02-22 23:05:32 +09:00
{
$rsa = new Crypt_RSA();
2010-03-13 11:44:18 +09:00
$keypair = $rsa->createKey();
2010-03-13 11:44:18 +09:00
$rsa->loadKey($keypair['privatekey']);
$this->privateKey = new Crypt_RSA();
2010-03-13 11:44:18 +09:00
$this->privateKey->loadKey($keypair['privatekey']);
$this->publicKey = new Crypt_RSA();
2010-03-13 11:44:18 +09:00
$this->publicKey->loadKey($keypair['publickey']);
2010-02-26 13:37:59 +09:00
$this->user_id = $user_id;
$this->insert();
2010-02-22 23:05:32 +09:00
}
/**
* Encode the keypair or public key as a string.
*
* @param boolean $full_pair set to false to leave out the private key.
* @return string
*/
2010-02-22 23:05:32 +09:00
public function toString($full_pair = true)
{
$mod = Magicsig::base64_url_encode($this->publicKey->modulus->toBytes());
$exp = Magicsig::base64_url_encode($this->publicKey->exponent->toBytes());
2010-02-22 23:05:32 +09:00
$private_exp = '';
if ($full_pair && $this->privateKey->exponent->toBytes()) {
$private_exp = '.' . Magicsig::base64_url_encode($this->privateKey->exponent->toBytes());
2010-02-22 23:05:32 +09:00
}
return 'RSA.' . $mod . '.' . $exp . $private_exp;
2010-02-22 23:05:32 +09:00
}
/**
* Decode a string representation of an RSA public key or keypair
* as a Magicsig object which can be used to sign or verify.
*
* @param string $text
* @return Magicsig
*/
public static function fromString($text)
2010-02-22 23:05:32 +09:00
{
$magic_sig = new Magicsig();
2010-02-22 23:05:32 +09:00
// remove whitespace
$text = preg_replace('/\s+/', '', $text);
// parse components
if (!preg_match('/RSA\.([^\.]+)\.([^\.]+)(.([^\.]+))?/', $text, $matches)) {
return false;
}
$mod = $matches[1];
$exp = $matches[2];
if (!empty($matches[4])) {
$private_exp = $matches[4];
} else {
$private_exp = false;
2010-02-22 23:05:32 +09:00
}
$magic_sig->loadKey($mod, $exp, 'public');
2010-02-22 23:05:32 +09:00
if ($private_exp) {
$magic_sig->loadKey($mod, $private_exp, 'private');
2010-02-22 23:05:32 +09:00
}
return $magic_sig;
2010-02-22 23:05:32 +09:00
}
/**
* Fill out $this->privateKey or $this->publicKey with a Crypt_RSA object
* representing the give key (as mod/exponent pair).
*
* @param string $mod base64-encoded
* @param string $exp base64-encoded exponent
* @param string $type one of 'public' or 'private'
*/
public function loadKey($mod, $exp, $type = 'public')
{
common_log(LOG_DEBUG, "Adding ".$type." key: (".$mod .', '. $exp .")");
$rsa = new Crypt_RSA();
$rsa->signatureMode = CRYPT_RSA_SIGNATURE_PKCS1;
$rsa->setHash('sha256');
$rsa->modulus = new Math_BigInteger(Magicsig::base64_url_decode($mod), 256);
$rsa->k = strlen($rsa->modulus->toBytes());
$rsa->exponent = new Math_BigInteger(Magicsig::base64_url_decode($exp), 256);
if ($type == 'private') {
$this->privateKey = $rsa;
} else {
$this->publicKey = $rsa;
}
}
/**
* Returns the name of the crypto algorithm used for this key.
*
* @return string
*/
2010-02-22 23:05:32 +09:00
public function getName()
{
2010-02-23 13:44:33 +09:00
return $this->alg;
2010-02-22 23:05:32 +09:00
}
/**
* Returns the name of a hash function to use for signing with this key.
*
* @return string
* @fixme is this used? doesn't seem to be called by name.
*/
public function getHash()
{
switch ($this->alg) {
case 'RSA-SHA256':
2010-03-13 11:44:18 +09:00
return 'sha256';
}
}
/**
* Generate base64-encoded signature for the given byte string
* using our private key.
*
* @param string $bytes as raw byte string
* @return string base64-encoded signature
*/
2010-02-22 23:05:32 +09:00
public function sign($bytes)
{
$sig = $this->privateKey->sign($bytes);
return Magicsig::base64_url_encode($sig);
2010-02-22 23:05:32 +09:00
}
/**
*
* @param string $signed_bytes as raw byte string
* @param string $signature as base64
* @return boolean
*/
2010-02-22 23:05:32 +09:00
public function verify($signed_bytes, $signature)
{
$signature = Magicsig::base64_url_decode($signature);
return $this->publicKey->verify($signed_bytes, $signature);
2010-02-22 23:05:32 +09:00
}
/**
* URL-encoding-friendly base64 variant encoding.
*
* @param string $input
* @return string
*/
public static function base64_url_encode($input)
{
return strtr(base64_encode($input), '+/', '-_');
}
/**
* URL-encoding-friendly base64 variant decoding.
*
* @param string $input
* @return string
*/
public static function base64_url_decode($input)
{
return base64_decode(strtr($input, '-_', '+/'));
}
}