1 | <?php |
||
2 | |||
3 | namespace Gameap\Services\Daemon; |
||
4 | |||
5 | use Carbon\Carbon; |
||
6 | use Gameap\Exceptions\GameapException; |
||
7 | use Illuminate\Support\Facades\Storage; |
||
8 | use phpseclib3\Crypt\EC; |
||
9 | use phpseclib3\Crypt\RSA; |
||
10 | use Sop\CryptoEncoding\PEM; |
||
11 | use Sop\CryptoTypes\AlgorithmIdentifier\Hash\SHA256AlgorithmIdentifier; |
||
12 | use Sop\CryptoTypes\AlgorithmIdentifier\Signature\SignatureAlgorithmIdentifierFactory; |
||
13 | use Sop\CryptoTypes\Asymmetric\PrivateKeyInfo; |
||
14 | use X501\ASN1\Name; |
||
15 | use X509\Certificate\Certificate; |
||
16 | use X509\Certificate\Extension\BasicConstraintsExtension; |
||
17 | use X509\Certificate\Extension\KeyUsageExtension; |
||
18 | use X509\Certificate\Extension\SubjectKeyIdentifierExtension; |
||
19 | use X509\Certificate\TBSCertificate; |
||
20 | use X509\Certificate\Validity; |
||
21 | use X509\CertificationRequest\CertificationRequest; |
||
22 | use X509\CertificationRequest\CertificationRequestInfo; |
||
23 | |||
24 | class CertificateService |
||
25 | { |
||
26 | public const ROOT_CA_CERT = 'certs/root.crt'; |
||
27 | public const ROOT_CA_KEY = 'certs/root.key'; |
||
28 | |||
29 | public const PRIVATE_KEY_BITS = 2048; |
||
30 | |||
31 | public const CERT_YEARS = 10; |
||
32 | |||
33 | /** |
||
34 | * Generate CA root key and certificate. |
||
35 | * Write root key and certificate to a Storage. |
||
36 | */ |
||
37 | public static function generateRoot(): void |
||
38 | { |
||
39 | $privateKey = self::generateKey(); |
||
40 | |||
41 | $privateKeyInfo = PrivateKeyInfo::fromPEM(PEM::fromString($privateKey)); |
||
42 | |||
43 | $publicKeyInfo = $privateKeyInfo->publicKeyInfo(); |
||
44 | |||
45 | $name = Name::fromString('CN=GameAP CA, O=GameAP, C=RU'); |
||
46 | |||
47 | $validity = Validity::fromStrings('now', 'now + ' . self::CERT_YEARS . ' years'); |
||
48 | |||
49 | // create "to be signed" certificate object with extensions |
||
50 | $tbsCert = new TBSCertificate($name, $publicKeyInfo, $name, $validity); |
||
51 | |||
52 | $tbsCert = $tbsCert->withRandomSerialNumber()->withAdditionalExtensions( |
||
53 | new BasicConstraintsExtension(true, true), |
||
54 | new SubjectKeyIdentifierExtension(false, $publicKeyInfo->keyIdentifier()), |
||
55 | new KeyUsageExtension( |
||
56 | true, |
||
57 | KeyUsageExtension::DIGITAL_SIGNATURE | KeyUsageExtension::KEY_CERT_SIGN |
||
58 | ) |
||
59 | ); |
||
60 | |||
61 | // sign certificate with private key |
||
62 | $algo = SignatureAlgorithmIdentifierFactory::algoForAsymmetricCrypto( |
||
63 | $privateKeyInfo->algorithmIdentifier(), |
||
64 | new SHA256AlgorithmIdentifier() |
||
65 | ); |
||
66 | |||
67 | $cert = $tbsCert->sign($algo, $privateKeyInfo); |
||
68 | |||
69 | Storage::put(self::ROOT_CA_CERT, $cert); |
||
70 | Storage::put(self::ROOT_CA_KEY, $privateKey); |
||
71 | } |
||
72 | |||
73 | public static function getRootKey(): string |
||
74 | { |
||
75 | if (!Storage::exists(self::ROOT_CA_KEY)) { |
||
76 | self::generateRoot(); |
||
77 | } |
||
78 | |||
79 | return Storage::get(self::ROOT_CA_KEY); |
||
80 | } |
||
81 | |||
82 | public static function getRootCert(): string |
||
83 | { |
||
84 | if (!Storage::exists(self::ROOT_CA_CERT)) { |
||
85 | self::generateRoot(); |
||
86 | } |
||
87 | |||
88 | return Storage::get(self::ROOT_CA_CERT); |
||
89 | } |
||
90 | |||
91 | /** |
||
92 | * Generate key and certificate. Sign certificate |
||
93 | * |
||
94 | * @param $certificatePath string path to certificate in storage |
||
95 | * @param $keyPath string path to key in storage |
||
96 | * |
||
97 | * @throws GameapException |
||
98 | */ |
||
99 | public static function generate($certificatePath, $keyPath): void |
||
100 | { |
||
101 | $privateKey = self::generateKey(); |
||
102 | |||
103 | $privateKeyInfo = PrivateKeyInfo::fromPEM( |
||
104 | PEM::fromString($privateKey) |
||
105 | ); |
||
106 | |||
107 | // extract public key from private key |
||
108 | $publicKeyInfo = $privateKeyInfo->publicKeyInfo(); |
||
109 | |||
110 | // DN of the subject |
||
111 | $subject = Name::fromString('CN=' . gethostname() . ', O=GameAP'); |
||
112 | |||
113 | // create certification request info |
||
114 | $cri = new CertificationRequestInfo($subject, $publicKeyInfo); |
||
115 | |||
116 | // sign certificate request with private key |
||
117 | $algo = SignatureAlgorithmIdentifierFactory::algoForAsymmetricCrypto( |
||
118 | $privateKeyInfo->algorithmIdentifier(), |
||
119 | new SHA256AlgorithmIdentifier() |
||
120 | ); |
||
121 | |||
122 | $csr = $cri->sign($algo, $privateKeyInfo); |
||
123 | |||
124 | $cert = self::signCsr($csr); |
||
125 | |||
126 | Storage::put($certificatePath, $cert); |
||
127 | Storage::put($keyPath, $privateKey); |
||
128 | } |
||
129 | |||
130 | public static function generateKey(): string |
||
131 | { |
||
132 | return RSA::createKey(); |
||
133 | } |
||
134 | |||
135 | public static function generateCsr(string $key): string |
||
136 | { |
||
137 | $privateKeyInfo = PrivateKeyInfo::fromPEM( |
||
138 | PEM::fromString($key) |
||
139 | ); |
||
140 | |||
141 | $publicKeyInfo = $privateKeyInfo->publicKeyInfo(); |
||
142 | |||
143 | $subject = Name::fromString('CN=*, O=GameAP, C=RU'); |
||
144 | |||
145 | $cri = new CertificationRequestInfo($subject, $publicKeyInfo); |
||
146 | |||
147 | $algo = SignatureAlgorithmIdentifierFactory::algoForAsymmetricCrypto( |
||
148 | $privateKeyInfo->algorithmIdentifier(), |
||
149 | new SHA256AlgorithmIdentifier() |
||
150 | ); |
||
151 | |||
152 | $csr = $cri->sign($algo, $privateKeyInfo); |
||
153 | |||
154 | return $csr; |
||
155 | } |
||
156 | |||
157 | /** |
||
158 | * @param $csr string PEM string |
||
159 | * |
||
160 | * @return string PEM certificate |
||
161 | * @throws GameapException |
||
162 | */ |
||
163 | public static function signCsr(string $csr) |
||
164 | { |
||
165 | // load CA's private key |
||
166 | $privateKeyInfo = PrivateKeyInfo::fromPEM( |
||
167 | PEM::fromString(self::getRootKey()) |
||
168 | ); |
||
169 | |||
170 | $issuerCert = Certificate::fromPEM( |
||
171 | PEM::fromString(self::getRootCert()) |
||
172 | ); |
||
173 | |||
174 | $certificationRequest = CertificationRequest::fromPEM(PEM::fromString($csr)); |
||
175 | |||
176 | if (!$certificationRequest->verify()) { |
||
177 | throw new GameapException('Failed to verify certification request signature.'); |
||
178 | } |
||
179 | |||
180 | $tbsCert = TBSCertificate::fromCSR($certificationRequest)->withIssuerCertificate($issuerCert); |
||
181 | |||
182 | $tbsCert = $tbsCert->withRandomSerialNumber(); |
||
183 | |||
184 | $tbsCert = $tbsCert->withValidity( |
||
185 | Validity::fromStrings('now', 'now + ' . self::CERT_YEARS . ' years') |
||
186 | ); |
||
187 | |||
188 | $tbsCert = $tbsCert->withVersion(0); |
||
189 | |||
190 | // sign certificate with issuer's private key |
||
191 | $algo = SignatureAlgorithmIdentifierFactory::algoForAsymmetricCrypto( |
||
192 | $privateKeyInfo->algorithmIdentifier(), |
||
193 | new SHA256AlgorithmIdentifier() |
||
194 | ); |
||
195 | |||
196 | $cert = $tbsCert->sign($algo, $privateKeyInfo); |
||
197 | return $cert; |
||
198 | } |
||
199 | |||
200 | /** |
||
201 | * @param $certificatePath |
||
202 | * |
||
203 | * @return string |
||
204 | */ |
||
205 | public static function fingerprintString($certificatePath) |
||
206 | { |
||
207 | $fingerprint = openssl_x509_fingerprint(Storage::get($certificatePath), 'sha256'); |
||
208 | return strtoupper(implode(':', str_split($fingerprint, 2))); |
||
0 ignored issues
–
show
Bug
introduced
by
![]() |
|||
209 | } |
||
210 | |||
211 | /** |
||
212 | * @param $certificatePath |
||
213 | * |
||
214 | * @return array |
||
215 | */ |
||
216 | public static function certificateInfo($certificatePath) |
||
217 | { |
||
218 | $parsed = openssl_x509_parse(Storage::get($certificatePath)); |
||
219 | |||
220 | return [ |
||
221 | 'expires' => Carbon::createFromTimestamp($parsed['validTo_time_t'])->toDateTimeString(), |
||
222 | |||
223 | 'signature_type' => $parsed['signatureTypeSN'], |
||
224 | |||
225 | 'country' => $parsed['subject']['C'] ?? '', |
||
226 | 'state' => $parsed['subject']['ST'] ?? '', |
||
227 | 'locality' => $parsed['subject']['L'] ?? '', |
||
228 | 'organization' => $parsed['subject']['O'] ?? '', |
||
229 | 'organizational_unit' => $parsed['subject']['OU'] ?? '', |
||
230 | 'common_name' => $parsed['subject']['CN'] ?? '', |
||
231 | 'email' => $parsed['subject']['emailAddress'] ?? '', |
||
232 | |||
233 | 'issuer_country' => $parsed['issuer']['C'] ?? '', |
||
234 | 'issuer_state' => $parsed['issuer']['ST'] ?? '', |
||
235 | 'issuer_locality' => $parsed['issuer']['L'] ?? '', |
||
236 | 'issuer_organization' => $parsed['issuer']['O'] ?? '', |
||
237 | 'issuer_organizational_unit' => $parsed['issuer']['OU'] ?? '', |
||
238 | 'issuer_common_name' => $parsed['issuer']['CN'] ?? '', |
||
239 | 'issuer_email' => $parsed['issuer']['emailAddress'] ?? '', |
||
240 | ]; |
||
241 | } |
||
242 | } |
||
243 |