1 | <?php |
||
2 | |||
3 | declare(strict_types=1); |
||
4 | |||
5 | namespace SimpleSAML\XMLSecurity\XML; |
||
6 | |||
7 | use DOMElement; |
||
8 | use SimpleSAML\Assert\Assert; |
||
9 | use SimpleSAML\XML\AbstractElement; |
||
10 | use SimpleSAML\XML\Exception\InvalidDOMElementException; |
||
11 | use SimpleSAML\XML\Exception\TooManyElementsException; |
||
12 | use SimpleSAML\XMLSecurity\Alg\Encryption\EncryptionAlgorithmFactory; |
||
13 | use SimpleSAML\XMLSecurity\Alg\Encryption\EncryptionAlgorithmInterface; |
||
14 | use SimpleSAML\XMLSecurity\Backend\EncryptionBackend; |
||
15 | use SimpleSAML\XMLSecurity\Constants as C; |
||
16 | use SimpleSAML\XMLSecurity\Exception\InvalidArgumentException; |
||
17 | use SimpleSAML\XMLSecurity\Exception\NoEncryptedDataException; |
||
18 | use SimpleSAML\XMLSecurity\Exception\RuntimeException; |
||
19 | use SimpleSAML\XMLSecurity\Key\SymmetricKey; |
||
20 | use SimpleSAML\XMLSecurity\XML\xenc\EncryptedData; |
||
21 | use SimpleSAML\XMLSecurity\XML\xenc\EncryptedKey; |
||
22 | |||
23 | /** |
||
24 | * Trait aggregating functionality for encrypted elements. |
||
25 | * |
||
26 | * @package simplesamlphp/xml-security |
||
27 | */ |
||
28 | trait EncryptedElementTrait |
||
29 | { |
||
30 | /** @var \SimpleSAML\XMLSecurity\XML\xenc\EncryptedKey|null */ |
||
31 | protected ?EncryptedKey $encryptedKey = null; |
||
32 | |||
33 | |||
34 | /** |
||
35 | * Constructor for encrypted elements. |
||
36 | * |
||
37 | * @param \SimpleSAML\XMLSecurity\XML\xenc\EncryptedData $encryptedData The EncryptedData object. |
||
38 | */ |
||
39 | public function __construct( |
||
40 | protected EncryptedData $encryptedData, |
||
41 | ) { |
||
42 | $keyInfo = $this->encryptedData->getKeyInfo(); |
||
43 | if ($keyInfo === null) { |
||
44 | return; |
||
45 | } |
||
46 | |||
47 | foreach ($keyInfo->getInfo() as $info) { |
||
48 | if ($info instanceof EncryptedKey) { |
||
49 | $this->encryptedKey = $info; |
||
50 | break; |
||
51 | } |
||
52 | } |
||
53 | } |
||
54 | |||
55 | |||
56 | /** |
||
57 | * Whether the encrypted object is accompanied by the decryption key or not. |
||
58 | * |
||
59 | * @return bool |
||
60 | */ |
||
61 | public function hasDecryptionKey(): bool |
||
62 | { |
||
63 | return $this->encryptedKey !== null; |
||
64 | } |
||
65 | |||
66 | |||
67 | /** |
||
68 | * Get the encrypted key used to encrypt the current element. |
||
69 | * |
||
70 | * @return \SimpleSAML\XMLSecurity\XML\xenc\EncryptedKey |
||
71 | */ |
||
72 | public function getEncryptedKey(): EncryptedKey |
||
73 | { |
||
74 | return $this->encryptedKey; |
||
0 ignored issues
–
show
Bug
Best Practice
introduced
by
![]() |
|||
75 | } |
||
76 | |||
77 | |||
78 | /** |
||
79 | * Get the EncryptedData object. |
||
80 | * |
||
81 | * @return \SimpleSAML\XMLSecurity\XML\xenc\EncryptedData |
||
82 | */ |
||
83 | public function getEncryptedData(): EncryptedData |
||
84 | { |
||
85 | return $this->encryptedData; |
||
86 | } |
||
87 | |||
88 | |||
89 | /** |
||
90 | * Decrypt the data in any given element. |
||
91 | * |
||
92 | * Use this method to decrypt an EncryptedData XML elemento into a string. If the resulting plaintext represents |
||
93 | * an XML document which has a corresponding implementation extending \SimpleSAML\XML\ElementInterface, you |
||
94 | * can call this method to build an object from the resulting plaintext: |
||
95 | * |
||
96 | * $data = $this->decryptData($decryptor); |
||
97 | * $xml = \SimpleSAML\XML\DOMDocumentFactory::fromString($data); |
||
98 | * $object = MyObject::fromXML($xml->documentElement); |
||
99 | * |
||
100 | * If the class using this trait implements \SimpleSAML\XMLSecurity\XML\EncryptedElementInterface, then the |
||
101 | * decrypt() method will only need the proposed code and return the object. |
||
102 | * |
||
103 | * @param \SimpleSAML\XMLSecurity\Alg\Encryption\EncryptionAlgorithmInterface $decryptor The decryptor to use to |
||
104 | * decrypt the object. |
||
105 | * |
||
106 | * @return string The decrypted data. |
||
107 | */ |
||
108 | protected function decryptData(EncryptionAlgorithmInterface $decryptor): string |
||
109 | { |
||
110 | $encData = $this->getEncryptedData(); |
||
111 | if (!$encData instanceof EncryptedData) { |
||
0 ignored issues
–
show
|
|||
112 | throw new NoEncryptedDataException(); |
||
113 | } |
||
114 | |||
115 | $algId = $decryptor->getAlgorithmId(); |
||
116 | $encMethod = $this->getEncryptedData()->getEncryptionMethod(); |
||
117 | if ($encMethod !== null) { |
||
118 | $algId = $encMethod->getAlgorithm(); |
||
119 | } |
||
120 | |||
121 | if (in_array($decryptor->getAlgorithmId(), C::$KEY_TRANSPORT_ALGORITHMS)) { |
||
122 | // the decryptor uses a key transport algorithm, check if we have a session key |
||
123 | if ($this->hasDecryptionKey() === null) { |
||
0 ignored issues
–
show
|
|||
124 | throw new RuntimeException('Cannot use a key transport algorithm to decrypt an object.'); |
||
125 | } |
||
126 | |||
127 | if ($encMethod === null) { |
||
128 | throw new RuntimeException('Cannot decrypt data with a session key and no EncryptionMethod.'); |
||
129 | } |
||
130 | |||
131 | $encryptedKey = $this->getEncryptedKey(); |
||
132 | $decryptionKey = $encryptedKey->decrypt($decryptor); |
||
133 | |||
134 | $factory = new EncryptionAlgorithmFactory( |
||
135 | $this->getBlacklistedAlgorithms() ?? EncryptionAlgorithmFactory::DEFAULT_BLACKLIST, |
||
136 | ); |
||
137 | $decryptor = $factory->getAlgorithm($encMethod->getAlgorithm(), new SymmetricKey($decryptionKey)); |
||
138 | $decryptor->setBackend($this->getEncryptionBackend()); |
||
139 | } |
||
140 | |||
141 | if ($algId !== $decryptor->getAlgorithmId()) { |
||
142 | throw new InvalidArgumentException('Decryption algorithm does not match EncryptionMethod.'); |
||
143 | } |
||
144 | |||
145 | return $decryptor->decrypt(base64_decode($encData->getCipherData()->getCipherValue()->getContent(), true)); |
||
146 | } |
||
147 | |||
148 | |||
149 | /** |
||
150 | * @inheritDoc |
||
151 | * |
||
152 | * @throws \SimpleSAML\XML\Exception\InvalidDOMElementException |
||
153 | * If the qualified name of the supplied element is wrong |
||
154 | */ |
||
155 | public static function fromXML(DOMElement $xml): static |
||
156 | { |
||
157 | Assert::same( |
||
158 | $xml->localName, |
||
159 | AbstractElement::getClassName(static::class), |
||
160 | InvalidDOMElementException::class, |
||
161 | ); |
||
162 | Assert::same($xml->namespaceURI, static::NS, InvalidDOMElementException::class); |
||
0 ignored issues
–
show
|
|||
163 | |||
164 | $ed = EncryptedData::getChildrenOfClass($xml); |
||
165 | Assert::count( |
||
166 | $ed, |
||
167 | 1, |
||
168 | sprintf( |
||
169 | 'No more or less than one EncryptedData element allowed in %s.', |
||
170 | AbstractElement::getClassName(static::class), |
||
171 | ), |
||
172 | TooManyElementsException::class, |
||
173 | ); |
||
174 | |||
175 | return new static($ed[0]); |
||
176 | } |
||
177 | |||
178 | |||
179 | /** |
||
180 | * @inheritDoc |
||
181 | */ |
||
182 | public function toXML(?DOMElement $parent = null): DOMElement |
||
183 | { |
||
184 | $e = $this->instantiateParentElement($parent); |
||
185 | $this->encryptedData->toXML($e); |
||
186 | return $e; |
||
187 | } |
||
188 | |||
189 | |||
190 | /** |
||
191 | * Create a document structure for this element. |
||
192 | * |
||
193 | * The AbstractElement class implements this method. If your object inherits from that class, you will already |
||
194 | * have this method out of the box. |
||
195 | * |
||
196 | * @param \DOMElement|null $parent The element we should append to. |
||
197 | * @return \DOMElement |
||
198 | */ |
||
199 | abstract public function instantiateParentElement(?DOMElement $parent = null): DOMElement; |
||
200 | |||
201 | |||
202 | /** |
||
203 | * Get the encryption backend to use for any encryption operation. |
||
204 | * |
||
205 | * @return \SimpleSAML\XMLSecurity\Backend\EncryptionBackend|null The encryption backend to use, or null if we |
||
206 | * want to use the default. |
||
207 | */ |
||
208 | abstract public function getEncryptionBackend(): ?EncryptionBackend; |
||
209 | |||
210 | |||
211 | /** |
||
212 | * Get the list of algorithms that are blacklisted for any encryption operation. |
||
213 | * |
||
214 | * @return string[]|null An array with all algorithm identifiers that are blacklisted, or null to use this |
||
215 | * libraries default. |
||
216 | */ |
||
217 | abstract public function getBlacklistedAlgorithms(): ?array; |
||
218 | } |
||
219 |