These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more
1 | <?php |
||
2 | |||
3 | /* |
||
4 | * The MIT License (MIT) |
||
5 | * |
||
6 | * Copyright (c) 2014-2016 Spomky-Labs |
||
7 | * |
||
8 | * This software may be modified and distributed under the terms |
||
9 | * of the MIT license. See the LICENSE file for details. |
||
10 | */ |
||
11 | |||
12 | namespace Jose\KeyConverter; |
||
13 | |||
14 | use Assert\Assertion; |
||
15 | use Base64Url\Base64Url; |
||
16 | |||
17 | /** |
||
18 | * This class will help you to load an EC key or a RSA key/certificate (private or public) and get values to create a JWK object. |
||
19 | */ |
||
20 | final class KeyConverter |
||
21 | { |
||
22 | /** |
||
23 | * @param string $file |
||
24 | * |
||
25 | * @throws \InvalidArgumentException |
||
26 | * |
||
27 | * @return array |
||
28 | */ |
||
29 | public static function loadKeyFromCertificateFile($file) |
||
30 | { |
||
31 | Assertion::true(file_exists($file), sprintf('File "%s" does not exist.', $file)); |
||
32 | $content = file_get_contents($file); |
||
33 | |||
34 | return self::loadKeyFromCertificate($content); |
||
35 | } |
||
36 | |||
37 | /** |
||
38 | * @param string $certificate |
||
39 | * |
||
40 | * @throws \InvalidArgumentException |
||
41 | * |
||
42 | * @return array |
||
43 | */ |
||
44 | public static function loadKeyFromCertificate($certificate) |
||
45 | { |
||
46 | try { |
||
47 | $res = openssl_x509_read($certificate); |
||
48 | } catch (\Exception $e) { |
||
49 | $certificate = self::convertDerToPem($certificate); |
||
50 | $res = openssl_x509_read($certificate); |
||
51 | } |
||
52 | Assertion::false(false === $res, 'Unable to load the certificate'); |
||
53 | |||
54 | $values = self::loadKeyFromX509Resource($res); |
||
55 | openssl_x509_free($res); |
||
56 | |||
57 | return $values; |
||
58 | } |
||
59 | |||
60 | /** |
||
61 | * @param resource $res |
||
62 | * |
||
63 | * @throws \Exception |
||
64 | * |
||
65 | * @return array |
||
66 | */ |
||
67 | public static function loadKeyFromX509Resource($res) |
||
68 | { |
||
69 | $key = openssl_get_publickey($res); |
||
70 | |||
71 | $details = openssl_pkey_get_details($key); |
||
72 | if (isset($details['key'])) { |
||
73 | $values = self::loadKeyFromPEM($details['key']); |
||
74 | openssl_x509_export($res, $out); |
||
75 | $values['x5c'] = [trim(preg_replace('#-.*-#', '', $out))]; |
||
76 | |||
77 | if (function_exists('openssl_x509_fingerprint')) { |
||
78 | $values['x5t'] = Base64Url::encode(openssl_x509_fingerprint($res, 'sha1', true)); |
||
79 | $values['x5t#256'] = Base64Url::encode(openssl_x509_fingerprint($res, 'sha256', true)); |
||
80 | } else { |
||
81 | openssl_x509_export($res, $pem); |
||
82 | $values['x5t'] = Base64Url::encode(self::calculateX509Fingerprint($pem, 'sha1', true)); |
||
83 | $values['x5t#256'] = Base64Url::encode(self::calculateX509Fingerprint($pem, 'sha256', true)); |
||
84 | } |
||
85 | |||
86 | return $values; |
||
87 | } |
||
88 | throw new \InvalidArgumentException('Unable to load the certificate'); |
||
89 | } |
||
90 | |||
91 | /** |
||
92 | * @param string $file |
||
93 | * @param null|string $password |
||
94 | * |
||
95 | * @throws \Exception |
||
96 | * |
||
97 | * @return array |
||
98 | */ |
||
99 | public static function loadFromKeyFile($file, $password = null) |
||
100 | { |
||
101 | $content = file_get_contents($file); |
||
102 | |||
103 | return self::loadFromKey($content, $password); |
||
104 | } |
||
105 | |||
106 | /** |
||
107 | * @param string $key |
||
108 | * @param null|string $password |
||
109 | * |
||
110 | * @throws \Exception |
||
111 | * |
||
112 | * @return array |
||
113 | */ |
||
114 | public static function loadFromKey($key, $password = null) |
||
115 | { |
||
116 | try { |
||
117 | return self::loadKeyFromDER($key, $password); |
||
118 | } catch (\Exception $e) { |
||
119 | return self::loadKeyFromPEM($key, $password); |
||
120 | } |
||
121 | } |
||
122 | |||
123 | /** |
||
124 | * @param string $der |
||
125 | * @param null|string $password |
||
126 | * |
||
127 | * @throws \Exception |
||
128 | * |
||
129 | * @return array |
||
130 | */ |
||
131 | private static function loadKeyFromDER($der, $password = null) |
||
132 | { |
||
133 | $pem = self::convertDerToPem($der); |
||
134 | |||
135 | return self::loadKeyFromPEM($pem, $password); |
||
136 | } |
||
137 | |||
138 | /** |
||
139 | * @param string $pem |
||
140 | * @param null|string $password |
||
141 | * |
||
142 | * @throws \Exception |
||
143 | * |
||
144 | * @return array |
||
145 | */ |
||
146 | private static function loadKeyFromPEM($pem, $password = null) |
||
147 | { |
||
148 | if (preg_match('#DEK-Info: (.+),(.+)#', $pem, $matches)) { |
||
149 | $pem = self::decodePem($pem, $matches, $password); |
||
150 | } |
||
151 | |||
152 | var_dump($pem); |
||
0 ignored issues
–
show
Security
Debugging Code
introduced
by
![]() |
|||
153 | $res = openssl_pkey_get_private($pem); |
||
154 | if ($res === false) { |
||
155 | $res = openssl_pkey_get_public($pem); |
||
156 | } |
||
157 | Assertion::false($res === false, 'Unable to load the key'); |
||
158 | |||
159 | $details = openssl_pkey_get_details($res); |
||
160 | Assertion::isArray($details, 'Unable to get details of the key'); |
||
161 | Assertion::keyExists($details, 'type', 'Unable to get details of the key'); |
||
162 | |||
163 | switch ($details['type']) { |
||
164 | case OPENSSL_KEYTYPE_EC: |
||
165 | $ec_key = new ECKey($pem); |
||
166 | |||
167 | return $ec_key->toArray(); |
||
168 | case OPENSSL_KEYTYPE_RSA: |
||
169 | $rsa_key = new RSAKey($pem); |
||
170 | |||
171 | return $rsa_key->toArray(); |
||
172 | default: |
||
173 | throw new \InvalidArgumentException('Unsupported key type'); |
||
174 | } |
||
175 | } |
||
176 | |||
177 | /** |
||
178 | * @param array $x5c |
||
179 | * |
||
180 | * @return array |
||
181 | */ |
||
182 | public static function loadFromX5C(array $x5c) |
||
183 | { |
||
184 | $certificate = null; |
||
185 | $last_issuer = null; |
||
186 | $last_subject = null; |
||
187 | foreach ($x5c as $cert) { |
||
188 | $current_cert = '-----BEGIN CERTIFICATE-----'.PHP_EOL.$cert.PHP_EOL.'-----END CERTIFICATE-----'; |
||
189 | $x509 = openssl_x509_read($current_cert); |
||
190 | if (false === $x509) { |
||
191 | $last_issuer = null; |
||
192 | $last_subject = null; |
||
193 | break; |
||
194 | } |
||
195 | $parsed = openssl_x509_parse($x509); |
||
196 | |||
197 | openssl_x509_free($x509); |
||
198 | if (false === $parsed) { |
||
199 | $last_issuer = null; |
||
200 | $last_subject = null; |
||
201 | break; |
||
202 | } |
||
203 | if (null === $last_subject) { |
||
204 | $last_subject = $parsed['subject']; |
||
205 | $last_issuer = $parsed['issuer']; |
||
206 | $certificate = $current_cert; |
||
207 | } else { |
||
208 | if (json_encode($last_issuer) === json_encode($parsed['subject'])) { |
||
209 | $last_subject = $parsed['subject']; |
||
210 | $last_issuer = $parsed['issuer']; |
||
211 | } else { |
||
212 | $last_issuer = null; |
||
213 | $last_subject = null; |
||
214 | break; |
||
215 | } |
||
216 | } |
||
217 | } |
||
218 | Assertion::false( |
||
219 | null === $last_issuer || json_encode($last_issuer) !== json_encode($last_subject), |
||
220 | 'Invalid certificate chain.' |
||
221 | ); |
||
222 | |||
223 | return self::loadKeyFromCertificate($certificate); |
||
224 | } |
||
225 | |||
226 | /** |
||
227 | * @param string $pem |
||
228 | * @param string[] $matches |
||
229 | * @param null|string $password |
||
230 | * |
||
231 | * @return string |
||
232 | */ |
||
233 | private static function decodePem($pem, array $matches, $password = null) |
||
234 | { |
||
235 | Assertion::notNull($password, 'Password required for encrypted keys.'); |
||
236 | |||
237 | $iv = pack('H*', trim($matches[2])); |
||
238 | $iv_sub = mb_substr($iv, 0, 8, '8bit'); |
||
239 | $symkey = pack('H*', md5($password.$iv_sub)); |
||
240 | $symkey .= pack('H*', md5($symkey.$password.$iv_sub)); |
||
241 | $key = preg_replace('#^(?:Proc-Type|DEK-Info): .*#m', '', $pem); |
||
242 | $ciphertext = base64_decode(preg_replace('#-.*-|\r|\n#', '', $key)); |
||
243 | |||
244 | $decoded = openssl_decrypt($ciphertext, strtolower($matches[1]), $symkey, true, $iv); |
||
245 | |||
246 | $number = preg_match_all('#-{5}.*-{5}#', $pem, $result); |
||
247 | Assertion::eq($number, 2, 'Unable to load the key'); |
||
248 | |||
249 | $pem = $result[0][0].PHP_EOL; |
||
250 | $pem .= chunk_split(base64_encode($decoded), 64); |
||
251 | $pem .= $result[0][1].PHP_EOL; |
||
252 | |||
253 | return $pem; |
||
254 | } |
||
255 | |||
256 | /** |
||
257 | * @param string $der_data |
||
258 | * |
||
259 | * @return string |
||
260 | */ |
||
261 | private static function convertDerToPem($der_data) |
||
262 | { |
||
263 | $pem = chunk_split(base64_encode($der_data), 64, PHP_EOL); |
||
264 | $pem = '-----BEGIN CERTIFICATE-----'.PHP_EOL.$pem.'-----END CERTIFICATE-----'.PHP_EOL; |
||
265 | |||
266 | return $pem; |
||
267 | } |
||
268 | |||
269 | /** |
||
270 | * @param string $pem |
||
271 | * @param string $algorithm |
||
272 | * @param bool $binary |
||
273 | * |
||
274 | * @return string |
||
275 | */ |
||
276 | private static function calculateX509Fingerprint($pem, $algorithm, $binary = false) |
||
277 | { |
||
278 | $pem = preg_replace('#-.*-|\r|\n#', '', $pem); |
||
279 | $bin = base64_decode($pem); |
||
280 | |||
281 | return hash($algorithm, $bin, $binary); |
||
282 | } |
||
283 | } |
||
284 |