[e3d4e0a] | 1 | <?php
|
---|
| 2 |
|
---|
| 3 | namespace Firebase\JWT;
|
---|
| 4 |
|
---|
| 5 | use DomainException;
|
---|
| 6 | use InvalidArgumentException;
|
---|
| 7 | use UnexpectedValueException;
|
---|
| 8 |
|
---|
| 9 | /**
|
---|
| 10 | * JSON Web Key implementation, based on this spec:
|
---|
| 11 | * https://tools.ietf.org/html/draft-ietf-jose-json-web-key-41
|
---|
| 12 | *
|
---|
| 13 | * PHP version 5
|
---|
| 14 | *
|
---|
| 15 | * @category Authentication
|
---|
| 16 | * @package Authentication_JWT
|
---|
| 17 | * @author Bui Sy Nguyen <nguyenbs@gmail.com>
|
---|
| 18 | * @license http://opensource.org/licenses/BSD-3-Clause 3-clause BSD
|
---|
| 19 | * @link https://github.com/firebase/php-jwt
|
---|
| 20 | */
|
---|
| 21 | class JWK
|
---|
| 22 | {
|
---|
| 23 | private const OID = '1.2.840.10045.2.1';
|
---|
| 24 | private const ASN1_OBJECT_IDENTIFIER = 0x06;
|
---|
| 25 | private const ASN1_SEQUENCE = 0x10; // also defined in JWT
|
---|
| 26 | private const ASN1_BIT_STRING = 0x03;
|
---|
| 27 | private const EC_CURVES = [
|
---|
| 28 | 'P-256' => '1.2.840.10045.3.1.7', // Len: 64
|
---|
| 29 | 'secp256k1' => '1.3.132.0.10', // Len: 64
|
---|
| 30 | 'P-384' => '1.3.132.0.34', // Len: 96
|
---|
| 31 | // 'P-521' => '1.3.132.0.35', // Len: 132 (not supported)
|
---|
| 32 | ];
|
---|
| 33 |
|
---|
| 34 | // For keys with "kty" equal to "OKP" (Octet Key Pair), the "crv" parameter must contain the key subtype.
|
---|
| 35 | // This library supports the following subtypes:
|
---|
| 36 | private const OKP_SUBTYPES = [
|
---|
| 37 | 'Ed25519' => true, // RFC 8037
|
---|
| 38 | ];
|
---|
| 39 |
|
---|
| 40 | /**
|
---|
| 41 | * Parse a set of JWK keys
|
---|
| 42 | *
|
---|
| 43 | * @param array<mixed> $jwks The JSON Web Key Set as an associative array
|
---|
| 44 | * @param string $defaultAlg The algorithm for the Key object if "alg" is not set in the
|
---|
| 45 | * JSON Web Key Set
|
---|
| 46 | *
|
---|
| 47 | * @return array<string, Key> An associative array of key IDs (kid) to Key objects
|
---|
| 48 | *
|
---|
| 49 | * @throws InvalidArgumentException Provided JWK Set is empty
|
---|
| 50 | * @throws UnexpectedValueException Provided JWK Set was invalid
|
---|
| 51 | * @throws DomainException OpenSSL failure
|
---|
| 52 | *
|
---|
| 53 | * @uses parseKey
|
---|
| 54 | */
|
---|
| 55 | public static function parseKeySet(array $jwks, ?string $defaultAlg = null): array
|
---|
| 56 | {
|
---|
| 57 | $keys = [];
|
---|
| 58 |
|
---|
| 59 | if (!isset($jwks['keys'])) {
|
---|
| 60 | throw new UnexpectedValueException('"keys" member must exist in the JWK Set');
|
---|
| 61 | }
|
---|
| 62 |
|
---|
| 63 | if (empty($jwks['keys'])) {
|
---|
| 64 | throw new InvalidArgumentException('JWK Set did not contain any keys');
|
---|
| 65 | }
|
---|
| 66 |
|
---|
| 67 | foreach ($jwks['keys'] as $k => $v) {
|
---|
| 68 | $kid = isset($v['kid']) ? $v['kid'] : $k;
|
---|
| 69 | if ($key = self::parseKey($v, $defaultAlg)) {
|
---|
| 70 | $keys[(string) $kid] = $key;
|
---|
| 71 | }
|
---|
| 72 | }
|
---|
| 73 |
|
---|
| 74 | if (0 === \count($keys)) {
|
---|
| 75 | throw new UnexpectedValueException('No supported algorithms found in JWK Set');
|
---|
| 76 | }
|
---|
| 77 |
|
---|
| 78 | return $keys;
|
---|
| 79 | }
|
---|
| 80 |
|
---|
| 81 | /**
|
---|
| 82 | * Parse a JWK key
|
---|
| 83 | *
|
---|
| 84 | * @param array<mixed> $jwk An individual JWK
|
---|
| 85 | * @param string $defaultAlg The algorithm for the Key object if "alg" is not set in the
|
---|
| 86 | * JSON Web Key Set
|
---|
| 87 | *
|
---|
| 88 | * @return Key The key object for the JWK
|
---|
| 89 | *
|
---|
| 90 | * @throws InvalidArgumentException Provided JWK is empty
|
---|
| 91 | * @throws UnexpectedValueException Provided JWK was invalid
|
---|
| 92 | * @throws DomainException OpenSSL failure
|
---|
| 93 | *
|
---|
| 94 | * @uses createPemFromModulusAndExponent
|
---|
| 95 | */
|
---|
| 96 | public static function parseKey(array $jwk, ?string $defaultAlg = null): ?Key
|
---|
| 97 | {
|
---|
| 98 | if (empty($jwk)) {
|
---|
| 99 | throw new InvalidArgumentException('JWK must not be empty');
|
---|
| 100 | }
|
---|
| 101 |
|
---|
| 102 | if (!isset($jwk['kty'])) {
|
---|
| 103 | throw new UnexpectedValueException('JWK must contain a "kty" parameter');
|
---|
| 104 | }
|
---|
| 105 |
|
---|
| 106 | if (!isset($jwk['alg'])) {
|
---|
| 107 | if (\is_null($defaultAlg)) {
|
---|
| 108 | // The "alg" parameter is optional in a KTY, but an algorithm is required
|
---|
| 109 | // for parsing in this library. Use the $defaultAlg parameter when parsing the
|
---|
| 110 | // key set in order to prevent this error.
|
---|
| 111 | // @see https://datatracker.ietf.org/doc/html/rfc7517#section-4.4
|
---|
| 112 | throw new UnexpectedValueException('JWK must contain an "alg" parameter');
|
---|
| 113 | }
|
---|
| 114 | $jwk['alg'] = $defaultAlg;
|
---|
| 115 | }
|
---|
| 116 |
|
---|
| 117 | switch ($jwk['kty']) {
|
---|
| 118 | case 'RSA':
|
---|
| 119 | if (!empty($jwk['d'])) {
|
---|
| 120 | throw new UnexpectedValueException('RSA private keys are not supported');
|
---|
| 121 | }
|
---|
| 122 | if (!isset($jwk['n']) || !isset($jwk['e'])) {
|
---|
| 123 | throw new UnexpectedValueException('RSA keys must contain values for both "n" and "e"');
|
---|
| 124 | }
|
---|
| 125 |
|
---|
| 126 | $pem = self::createPemFromModulusAndExponent($jwk['n'], $jwk['e']);
|
---|
| 127 | $publicKey = \openssl_pkey_get_public($pem);
|
---|
| 128 | if (false === $publicKey) {
|
---|
| 129 | throw new DomainException(
|
---|
| 130 | 'OpenSSL error: ' . \openssl_error_string()
|
---|
| 131 | );
|
---|
| 132 | }
|
---|
| 133 | return new Key($publicKey, $jwk['alg']);
|
---|
| 134 | case 'EC':
|
---|
| 135 | if (isset($jwk['d'])) {
|
---|
| 136 | // The key is actually a private key
|
---|
| 137 | throw new UnexpectedValueException('Key data must be for a public key');
|
---|
| 138 | }
|
---|
| 139 |
|
---|
| 140 | if (empty($jwk['crv'])) {
|
---|
| 141 | throw new UnexpectedValueException('crv not set');
|
---|
| 142 | }
|
---|
| 143 |
|
---|
| 144 | if (!isset(self::EC_CURVES[$jwk['crv']])) {
|
---|
| 145 | throw new DomainException('Unrecognised or unsupported EC curve');
|
---|
| 146 | }
|
---|
| 147 |
|
---|
| 148 | if (empty($jwk['x']) || empty($jwk['y'])) {
|
---|
| 149 | throw new UnexpectedValueException('x and y not set');
|
---|
| 150 | }
|
---|
| 151 |
|
---|
| 152 | $publicKey = self::createPemFromCrvAndXYCoordinates($jwk['crv'], $jwk['x'], $jwk['y']);
|
---|
| 153 | return new Key($publicKey, $jwk['alg']);
|
---|
| 154 | case 'OKP':
|
---|
| 155 | if (isset($jwk['d'])) {
|
---|
| 156 | // The key is actually a private key
|
---|
| 157 | throw new UnexpectedValueException('Key data must be for a public key');
|
---|
| 158 | }
|
---|
| 159 |
|
---|
| 160 | if (!isset($jwk['crv'])) {
|
---|
| 161 | throw new UnexpectedValueException('crv not set');
|
---|
| 162 | }
|
---|
| 163 |
|
---|
| 164 | if (empty(self::OKP_SUBTYPES[$jwk['crv']])) {
|
---|
| 165 | throw new DomainException('Unrecognised or unsupported OKP key subtype');
|
---|
| 166 | }
|
---|
| 167 |
|
---|
| 168 | if (empty($jwk['x'])) {
|
---|
| 169 | throw new UnexpectedValueException('x not set');
|
---|
| 170 | }
|
---|
| 171 |
|
---|
| 172 | // This library works internally with EdDSA keys (Ed25519) encoded in standard base64.
|
---|
| 173 | $publicKey = JWT::convertBase64urlToBase64($jwk['x']);
|
---|
| 174 | return new Key($publicKey, $jwk['alg']);
|
---|
| 175 | default:
|
---|
| 176 | break;
|
---|
| 177 | }
|
---|
| 178 |
|
---|
| 179 | return null;
|
---|
| 180 | }
|
---|
| 181 |
|
---|
| 182 | /**
|
---|
| 183 | * Converts the EC JWK values to pem format.
|
---|
| 184 | *
|
---|
| 185 | * @param string $crv The EC curve (only P-256 & P-384 is supported)
|
---|
| 186 | * @param string $x The EC x-coordinate
|
---|
| 187 | * @param string $y The EC y-coordinate
|
---|
| 188 | *
|
---|
| 189 | * @return string
|
---|
| 190 | */
|
---|
| 191 | private static function createPemFromCrvAndXYCoordinates(string $crv, string $x, string $y): string
|
---|
| 192 | {
|
---|
| 193 | $pem =
|
---|
| 194 | self::encodeDER(
|
---|
| 195 | self::ASN1_SEQUENCE,
|
---|
| 196 | self::encodeDER(
|
---|
| 197 | self::ASN1_SEQUENCE,
|
---|
| 198 | self::encodeDER(
|
---|
| 199 | self::ASN1_OBJECT_IDENTIFIER,
|
---|
| 200 | self::encodeOID(self::OID)
|
---|
| 201 | )
|
---|
| 202 | . self::encodeDER(
|
---|
| 203 | self::ASN1_OBJECT_IDENTIFIER,
|
---|
| 204 | self::encodeOID(self::EC_CURVES[$crv])
|
---|
| 205 | )
|
---|
| 206 | ) .
|
---|
| 207 | self::encodeDER(
|
---|
| 208 | self::ASN1_BIT_STRING,
|
---|
| 209 | \chr(0x00) . \chr(0x04)
|
---|
| 210 | . JWT::urlsafeB64Decode($x)
|
---|
| 211 | . JWT::urlsafeB64Decode($y)
|
---|
| 212 | )
|
---|
| 213 | );
|
---|
| 214 |
|
---|
| 215 | return \sprintf(
|
---|
| 216 | "-----BEGIN PUBLIC KEY-----\n%s\n-----END PUBLIC KEY-----\n",
|
---|
| 217 | wordwrap(base64_encode($pem), 64, "\n", true)
|
---|
| 218 | );
|
---|
| 219 | }
|
---|
| 220 |
|
---|
| 221 | /**
|
---|
| 222 | * Create a public key represented in PEM format from RSA modulus and exponent information
|
---|
| 223 | *
|
---|
| 224 | * @param string $n The RSA modulus encoded in Base64
|
---|
| 225 | * @param string $e The RSA exponent encoded in Base64
|
---|
| 226 | *
|
---|
| 227 | * @return string The RSA public key represented in PEM format
|
---|
| 228 | *
|
---|
| 229 | * @uses encodeLength
|
---|
| 230 | */
|
---|
| 231 | private static function createPemFromModulusAndExponent(
|
---|
| 232 | string $n,
|
---|
| 233 | string $e
|
---|
| 234 | ): string {
|
---|
| 235 | $mod = JWT::urlsafeB64Decode($n);
|
---|
| 236 | $exp = JWT::urlsafeB64Decode($e);
|
---|
| 237 |
|
---|
| 238 | $modulus = \pack('Ca*a*', 2, self::encodeLength(\strlen($mod)), $mod);
|
---|
| 239 | $publicExponent = \pack('Ca*a*', 2, self::encodeLength(\strlen($exp)), $exp);
|
---|
| 240 |
|
---|
| 241 | $rsaPublicKey = \pack(
|
---|
| 242 | 'Ca*a*a*',
|
---|
| 243 | 48,
|
---|
| 244 | self::encodeLength(\strlen($modulus) + \strlen($publicExponent)),
|
---|
| 245 | $modulus,
|
---|
| 246 | $publicExponent
|
---|
| 247 | );
|
---|
| 248 |
|
---|
| 249 | // sequence(oid(1.2.840.113549.1.1.1), null)) = rsaEncryption.
|
---|
| 250 | $rsaOID = \pack('H*', '300d06092a864886f70d0101010500'); // hex version of MA0GCSqGSIb3DQEBAQUA
|
---|
| 251 | $rsaPublicKey = \chr(0) . $rsaPublicKey;
|
---|
| 252 | $rsaPublicKey = \chr(3) . self::encodeLength(\strlen($rsaPublicKey)) . $rsaPublicKey;
|
---|
| 253 |
|
---|
| 254 | $rsaPublicKey = \pack(
|
---|
| 255 | 'Ca*a*',
|
---|
| 256 | 48,
|
---|
| 257 | self::encodeLength(\strlen($rsaOID . $rsaPublicKey)),
|
---|
| 258 | $rsaOID . $rsaPublicKey
|
---|
| 259 | );
|
---|
| 260 |
|
---|
| 261 | return "-----BEGIN PUBLIC KEY-----\r\n" .
|
---|
| 262 | \chunk_split(\base64_encode($rsaPublicKey), 64) .
|
---|
| 263 | '-----END PUBLIC KEY-----';
|
---|
| 264 | }
|
---|
| 265 |
|
---|
| 266 | /**
|
---|
| 267 | * DER-encode the length
|
---|
| 268 | *
|
---|
| 269 | * DER supports lengths up to (2**8)**127, however, we'll only support lengths up to (2**8)**4. See
|
---|
| 270 | * {@link http://itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#p=13 X.690 paragraph 8.1.3} for more information.
|
---|
| 271 | *
|
---|
| 272 | * @param int $length
|
---|
| 273 | * @return string
|
---|
| 274 | */
|
---|
| 275 | private static function encodeLength(int $length): string
|
---|
| 276 | {
|
---|
| 277 | if ($length <= 0x7F) {
|
---|
| 278 | return \chr($length);
|
---|
| 279 | }
|
---|
| 280 |
|
---|
| 281 | $temp = \ltrim(\pack('N', $length), \chr(0));
|
---|
| 282 |
|
---|
| 283 | return \pack('Ca*', 0x80 | \strlen($temp), $temp);
|
---|
| 284 | }
|
---|
| 285 |
|
---|
| 286 | /**
|
---|
| 287 | * Encodes a value into a DER object.
|
---|
| 288 | * Also defined in Firebase\JWT\JWT
|
---|
| 289 | *
|
---|
| 290 | * @param int $type DER tag
|
---|
| 291 | * @param string $value the value to encode
|
---|
| 292 | * @return string the encoded object
|
---|
| 293 | */
|
---|
| 294 | private static function encodeDER(int $type, string $value): string
|
---|
| 295 | {
|
---|
| 296 | $tag_header = 0;
|
---|
| 297 | if ($type === self::ASN1_SEQUENCE) {
|
---|
| 298 | $tag_header |= 0x20;
|
---|
| 299 | }
|
---|
| 300 |
|
---|
| 301 | // Type
|
---|
| 302 | $der = \chr($tag_header | $type);
|
---|
| 303 |
|
---|
| 304 | // Length
|
---|
| 305 | $der .= \chr(\strlen($value));
|
---|
| 306 |
|
---|
| 307 | return $der . $value;
|
---|
| 308 | }
|
---|
| 309 |
|
---|
| 310 | /**
|
---|
| 311 | * Encodes a string into a DER-encoded OID.
|
---|
| 312 | *
|
---|
| 313 | * @param string $oid the OID string
|
---|
| 314 | * @return string the binary DER-encoded OID
|
---|
| 315 | */
|
---|
| 316 | private static function encodeOID(string $oid): string
|
---|
| 317 | {
|
---|
| 318 | $octets = explode('.', $oid);
|
---|
| 319 |
|
---|
| 320 | // Get the first octet
|
---|
| 321 | $first = (int) array_shift($octets);
|
---|
| 322 | $second = (int) array_shift($octets);
|
---|
| 323 | $oid = \chr($first * 40 + $second);
|
---|
| 324 |
|
---|
| 325 | // Iterate over subsequent octets
|
---|
| 326 | foreach ($octets as $octet) {
|
---|
| 327 | if ($octet == 0) {
|
---|
| 328 | $oid .= \chr(0x00);
|
---|
| 329 | continue;
|
---|
| 330 | }
|
---|
| 331 | $bin = '';
|
---|
| 332 |
|
---|
| 333 | while ($octet) {
|
---|
| 334 | $bin .= \chr(0x80 | ($octet & 0x7f));
|
---|
| 335 | $octet >>= 7;
|
---|
| 336 | }
|
---|
| 337 | $bin[0] = $bin[0] & \chr(0x7f);
|
---|
| 338 |
|
---|
| 339 | // Convert to big endian if necessary
|
---|
| 340 | if (pack('V', 65534) == pack('L', 65534)) {
|
---|
| 341 | $oid .= strrev($bin);
|
---|
| 342 | } else {
|
---|
| 343 | $oid .= $bin;
|
---|
| 344 | }
|
---|
| 345 | }
|
---|
| 346 |
|
---|
| 347 | return $oid;
|
---|
| 348 | }
|
---|
| 349 | }
|
---|