gnu-social/plugins/OStatus/classes/Magicsig.php

219 lines
5.8 KiB
PHP
Raw Normal View History

2010-02-22 23:05:32 +09:00
<?php
/**
* StatusNet - the distributed open-source microblogging tool
* Copyright (C) 2010, StatusNet, Inc.
*
* A sample module to show best practices for StatusNet plugins
*
* PHP version 5
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
* @package StatusNet
* @author James Walker <james@status.net>
* @copyright 2010 StatusNet, Inc.
* @license http://www.fsf.org/licensing/licenses/agpl-3.0.html AGPL 3.0
* @link http://status.net/
*/
require_once 'Crypt/RSA.php';
class Magicsig extends Memcached_DataObject
2010-02-22 23:05:32 +09:00
{
const PUBLICKEYREL = 'magic-public-key';
public $__table = 'magicsig';
public $user_id;
2010-02-22 23:05:32 +09:00
public $keypair;
public $alg;
2010-02-22 23:05:32 +09:00
private $_rsa;
public function __construct($alg = 'RSA-SHA256')
{
$this->alg = $alg;
}
public /*static*/ function staticGet($k, $v=null)
{
return parent::staticGet(__CLASS__, $k, $v);
}
function table()
2010-02-22 23:05:32 +09:00
{
return array(
'user_id' => DB_DATAOBJECT_INT,
'keypair' => DB_DATAOBJECT_STR + DB_DATAOBJECT_NOTNULL,
'alg' => DB_DATAOBJECT_STR
);
2010-02-22 23:05:32 +09:00
}
static function schemaDef()
{
return array(new ColumnDef('user_id', 'integer',
null, true, 'PRI'),
new ColumnDef('keypair', 'varchar',
255, false),
new ColumnDef('alg', 'varchar',
64, false));
}
2010-02-22 23:05:32 +09:00
function keys()
{
return array_keys($this->keyTypes());
}
function keyTypes()
{
return array('user_id' => 'K');
}
function insert()
{
$this->keypair = $this->toString();
return parent::insert();
}
2010-02-23 13:30:05 +09:00
2010-02-22 23:05:32 +09:00
public function generate($key_length = 512)
{
PEAR::pushErrorHandling(PEAR_ERROR_RETURN);
2010-02-22 23:05:32 +09:00
$keypair = new Crypt_RSA_KeyPair($key_length);
$params['public_key'] = $keypair->getPublicKey();
$params['private_key'] = $keypair->getPrivateKey();
$this->_rsa = new Crypt_RSA($params);
PEAR::popErrorHandling();
$this->insert();
2010-02-22 23:05:32 +09:00
}
public function toString($full_pair = true)
{
$public_key = $this->_rsa->_public_key;
$private_key = $this->_rsa->_private_key;
2010-02-22 23:05:32 +09:00
$mod = base64_url_encode($public_key->getModulus());
$exp = base64_url_encode($public_key->getExponent());
$private_exp = '';
if ($full_pair && $private_key->getExponent()) {
$private_exp = '.' . base64_url_encode($private_key->getExponent());
}
return 'RSA.' . $mod . '.' . $exp . $private_exp;
}
public static function fromString($text)
2010-02-22 23:05:32 +09:00
{
PEAR::pushErrorHandling(PEAR_ERROR_RETURN);
$magic_sig = new Magicsig();
2010-02-22 23:05:32 +09:00
// remove whitespace
$text = preg_replace('/\s+/', '', $text);
// parse components
if (!preg_match('/RSA\.([^\.]+)\.([^\.]+)(.([^\.]+))?/', $text, $matches)) {
return false;
}
$mod = base64_url_decode($matches[1]);
$exp = base64_url_decode($matches[2]);
if ($matches[4]) {
$private_exp = base64_url_decode($matches[4]);
}
$params['public_key'] = new Crypt_RSA_KEY($mod, $exp, 'public');
if ($params['public_key']->isError()) {
$error = $params['public_key']->getLastError();
2010-02-23 13:30:05 +09:00
common_log(LOG_DEBUG, 'RSA Error: '. $error->getMessage());
return false;
2010-02-22 23:05:32 +09:00
}
if ($private_exp) {
$params['private_key'] = new Crypt_RSA_KEY($mod, $private_exp, 'private');
if ($params['private_key']->isError()) {
$error = $params['private_key']->getLastError();
2010-02-23 13:30:05 +09:00
common_log(LOG_DEBUG, 'RSA Error: '. $error->getMessage());
return false;
2010-02-22 23:05:32 +09:00
}
}
$magic_sig->_rsa = new Crypt_RSA($params);
PEAR::popErrorHandling();
return $magic_sig;
2010-02-22 23:05:32 +09:00
}
public function getName()
{
2010-02-23 13:44:33 +09:00
return $this->alg;
2010-02-22 23:05:32 +09:00
}
public function getHash()
{
switch ($this->alg) {
case 'RSA-SHA256':
return 'sha256';
}
}
2010-02-22 23:05:32 +09:00
public function sign($bytes)
{
$sig = $this->_rsa->createSign($bytes, null, 'sha256');
if ($this->_rsa->isError()) {
$error = $this->_rsa->getLastError();
2010-02-22 23:05:32 +09:00
common_log(LOG_DEBUG, 'RSA Error: '. $error->getMessage());
2010-02-23 13:30:05 +09:00
return false;
2010-02-22 23:05:32 +09:00
}
return $sig;
}
public function verify($signed_bytes, $signature)
{
$result = $this->_rsa->validateSign($signed_bytes, $signature, null, 'sha256');
if ($this->_rsa->isError()) {
2010-02-22 23:05:32 +09:00
$error = $this->keypair->getLastError();
2010-02-23 13:30:05 +09:00
common_log(LOG_DEBUG, 'RSA Error: '. $error->getMessage());
return false;
2010-02-22 23:05:32 +09:00
}
return $result;
}
}
// Define a sha256 function for hashing
// (Crypt_RSA should really be updated to use hash() )
function sha256($bytes)
{
return hash('sha256', $bytes);
}
function base64_url_encode($input)
{
return strtr(base64_encode($input), '+/', '-_');
}
function base64_url_decode($input)
{
return base64_decode(strtr($input, '-_', '+/'));
}