diff options
Diffstat (limited to 'Zotlabs/Lib')
-rw-r--r-- | Zotlabs/Lib/Crypto.php | 86 |
1 files changed, 43 insertions, 43 deletions
diff --git a/Zotlabs/Lib/Crypto.php b/Zotlabs/Lib/Crypto.php index 3dba1bcf3..7c4654ec0 100644 --- a/Zotlabs/Lib/Crypto.php +++ b/Zotlabs/Lib/Crypto.php @@ -1,6 +1,7 @@ <?php namespace Zotlabs\Lib; + use Exception; class Crypto { @@ -9,27 +10,27 @@ class Crypto { // zot6 nickname, opensslname, keylength, ivlength - [ 'aes256ctr', 'aes-256-ctr', 32, 16 ], - [ 'camellia256cfb', 'camellia-256-cfb', 32, 16 ], - [ 'cast5cfb', 'cast5-cfb', 16, 8 ] + ['aes256ctr', 'aes-256-ctr', 32, 16], + ['camellia256cfb', 'camellia-256-cfb', 32, 16], + ['cast5cfb', 'cast5-cfb', 16, 8] ]; public static function methods() { $ret = []; - foreach(self::$openssl_algorithms as $ossl) { + foreach (self::$openssl_algorithms as $ossl) { $ret[] = $ossl[0] . '.oaep'; } - call_hooks('crypto_methods',$ret); + call_hooks('crypto_methods', $ret); return $ret; } public static function signing_methods() { - $ret = [ 'sha256' ]; - call_hooks('signing_methods',$ret); + $ret = ['sha256']; + call_hooks('signing_methods', $ret); return $ret; } @@ -42,7 +43,7 @@ class Crypto { 'encrypt_key' => false ]; - $conf = get_config('system','openssl_conf_file'); + $conf = get_config('system', 'openssl_conf_file'); if ($conf) { $openssl_options['config'] = $conf; @@ -56,45 +57,44 @@ class Crypto { // Get private key - $response = [ 'prvkey' => '', 'pubkey' => '' ]; + $response = ['prvkey' => '', 'pubkey' => '']; openssl_pkey_export($result, $response['prvkey']); // Get public key - $pkey = openssl_pkey_get_details($result); + $pkey = openssl_pkey_get_details($result); $response['pubkey'] = $pkey["key"]; return $response; } - public static function sign($data,$key,$alg = 'sha256') { + public static function sign($data, $key, $alg = 'sha256') { - if (! $key) { + if (!$key) { return false; } $sig = ''; - openssl_sign($data,$sig,$key,$alg); + openssl_sign($data, $sig, $key, $alg); return $sig; } - public static function verify($data,$sig,$key,$alg = 'sha256') { + public static function verify($data, $sig, $key, $alg = 'sha256') { - if (! $key) { + if (!$key) { return false; } try { - $verify = openssl_verify($data,$sig,$key,$alg); - } - catch (Exception $e) { + $verify = openssl_verify($data, $sig, $key, $alg); + } catch (Exception $e) { $verify = (-1); } if ($verify === (-1)) { while ($msg = openssl_error_string()) { - logger('openssl_verify: ' . $msg,LOGGER_NORMAL,LOG_ERR); + logger('openssl_verify: ' . $msg, LOGGER_NORMAL, LOG_ERR); } btlogger('openssl_verify: key: ' . $key, LOGGER_DEBUG, LOG_ERR); } @@ -102,16 +102,16 @@ class Crypto { return (($verify > 0) ? true : false); } - public static function encapsulate($data,$pubkey,$alg) { + public static function encapsulate($data, $pubkey, $alg) { - if (! ($alg && $pubkey)) { + if (!($alg && $pubkey)) { return $data; } $alg_base = $alg; $padding = OPENSSL_PKCS1_PADDING; - $exts = explode('.',$alg); + $exts = explode('.', $alg); if (count($exts) > 1) { switch ($exts[1]) { case 'oaep': @@ -133,35 +133,35 @@ class Crypto { } if ($method) { - $result = [ 'encrypted' => true ]; + $result = ['encrypted' => true]; - $key = openssl_random_pseudo_bytes(256); - $iv = openssl_random_pseudo_bytes(256); + $key = openssl_random_pseudo_bytes(256); + $iv = openssl_random_pseudo_bytes(256); - $key1 = substr($key, 0, $method[2]); - $iv1 = substr($iv, 0, $method[3]); + $key1 = substr($key, 0, $method[2]); + $iv1 = substr($iv, 0, $method[3]); - $result['data'] = base64url_encode(openssl_encrypt($data,$method[1],$key1,OPENSSL_RAW_DATA,$iv1),true); + $result['data'] = base64url_encode(openssl_encrypt($data, $method[1], $key1, OPENSSL_RAW_DATA, $iv1), true); - openssl_public_encrypt($key, $k, $pubkey, $padding); - openssl_public_encrypt($iv, $i, $pubkey, $padding); + openssl_public_encrypt($key, $k, $pubkey, $padding); + openssl_public_encrypt($iv, $i, $pubkey, $padding); - $result['alg'] = $alg; - $result['key'] = base64url_encode($k,true); - $result['iv'] = base64url_encode($i,true); - return $result; + $result['alg'] = $alg; + $result['key'] = base64url_encode($k, true); + $result['iv'] = base64url_encode($i, true); + return $result; } else { - $x = [ 'data' => $data, 'pubkey' => $pubkey, 'alg' => $alg, 'result' => $data ]; + $x = ['data' => $data, 'pubkey' => $pubkey, 'alg' => $alg, 'result' => $data]; call_hooks('crypto_encapsulate', $x); return $x['result']; } } - public static function unencapsulate($data,$prvkey) { + public static function unencapsulate($data, $prvkey) { - if (! (is_array($data) && array_key_exists('encrypted',$data) && array_key_exists('alg',$data) && $data['alg'])) { + if (!(is_array($data) && array_key_exists('encrypted', $data) && array_key_exists('alg', $data) && $data['alg'])) { logger('not encrypted'); return $data; @@ -170,7 +170,7 @@ class Crypto { $alg_base = $data['alg']; $padding = OPENSSL_PKCS1_PADDING; - $exts = explode('.',$data['alg']); + $exts = explode('.', $data['alg']); if (count($exts) > 1) { switch ($exts[1]) { case 'oaep': @@ -192,13 +192,13 @@ class Crypto { } if ($method) { - openssl_private_decrypt(base64url_decode($data['key']),$k,$prvkey,$padding); - openssl_private_decrypt(base64url_decode($data['iv']), $i,$prvkey,$padding); - return openssl_decrypt(base64url_decode($data['data']),$method[1],substr($k,0,$method[2]),OPENSSL_RAW_DATA,substr($i,0,$method[3])); + openssl_private_decrypt(base64url_decode($data['key']), $k, $prvkey, $padding); + openssl_private_decrypt(base64url_decode($data['iv']), $i, $prvkey, $padding); + return openssl_decrypt(base64url_decode($data['data']), $method[1], substr($k, 0, $method[2]), OPENSSL_RAW_DATA, substr($i, 0, $method[3])); } else { - $x = [ 'data' => $data, 'prvkey' => $prvkey, 'alg' => $data['alg'], 'result' => $data ]; - call_hooks('crypto_unencapsulate',$x); + $x = ['data' => $data, 'prvkey' => $prvkey, 'alg' => $data['alg'], 'result' => $data]; + call_hooks('crypto_unencapsulate', $x); return $x['result']; } } |