diff -r 5b37998e522e -r 162c1de6545a web/lib/Zend/InfoCard/Xml/Security.php --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/web/lib/Zend/InfoCard/Xml/Security.php Fri Mar 11 15:05:35 2011 +0100 @@ -0,0 +1,327 @@ +Signature)) { + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Could not identify XML Signature element"); + } + + if(!isset($sxe->Signature->SignedInfo)) { + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Signature is missing a SignedInfo block"); + } + + if(!isset($sxe->Signature->SignatureValue)) { + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Signature is missing a SignatureValue block"); + } + + if(!isset($sxe->Signature->KeyInfo)) { + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Signature is missing a KeyInfo block"); + } + + if(!isset($sxe->Signature->KeyInfo->KeyValue)) { + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Signature is missing a KeyValue block"); + } + + switch((string)$sxe->Signature->SignedInfo->CanonicalizationMethod['Algorithm']) { + case self::CANONICAL_METHOD_C14N_EXC: + $cMethod = (string)$sxe->Signature->SignedInfo->CanonicalizationMethod['Algorithm']; + break; + default: + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Unknown or unsupported CanonicalizationMethod Requested"); + break; + } + + switch((string)$sxe->Signature->SignedInfo->SignatureMethod['Algorithm']) { + case self::SIGNATURE_METHOD_SHA1: + $sMethod = (string)$sxe->Signature->SignedInfo->SignatureMethod['Algorithm']; + break; + default: + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Unknown or unsupported SignatureMethod Requested"); + break; + } + + switch((string)$sxe->Signature->SignedInfo->Reference->DigestMethod['Algorithm']) { + case self::DIGEST_METHOD_SHA1: + $dMethod = (string)$sxe->Signature->SignedInfo->Reference->DigestMethod['Algorithm']; + break; + default: + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Unknown or unsupported DigestMethod Requested"); + break; + } + + $base64DecodeSupportsStrictParam = version_compare(PHP_VERSION, '5.2.0', '>='); + + if ($base64DecodeSupportsStrictParam) { + $dValue = base64_decode((string)$sxe->Signature->SignedInfo->Reference->DigestValue, true); + } else { + $dValue = base64_decode((string)$sxe->Signature->SignedInfo->Reference->DigestValue); + } + + if ($base64DecodeSupportsStrictParam) { + $signatureValue = base64_decode((string)$sxe->Signature->SignatureValue, true); + } else { + $signatureValue = base64_decode((string)$sxe->Signature->SignatureValue); + } + + $transformer = new Zend_InfoCard_Xml_Security_Transform(); + + foreach($sxe->Signature->SignedInfo->Reference->Transforms->children() as $transform) { + $transformer->addTransform((string)$transform['Algorithm']); + } + + $transformed_xml = $transformer->applyTransforms($strXMLInput); + + $transformed_xml_binhash = pack("H*", sha1($transformed_xml)); + + if(!self::_secureStringCompare($transformed_xml_binhash, $dValue)) { + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Locally Transformed XML does not match XML Document. Cannot Verify Signature"); + } + + $public_key = null; + + switch(true) { + case isset($sxe->Signature->KeyInfo->KeyValue->X509Certificate): + + $certificate = (string)$sxe->Signature->KeyInfo->KeyValue->X509Certificate; + + + $pem = "-----BEGIN CERTIFICATE-----\n" . + wordwrap($certificate, 64, "\n", true) . + "\n-----END CERTIFICATE-----"; + + $public_key = openssl_pkey_get_public($pem); + + if(!$public_key) { + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Unable to extract and prcoess X509 Certificate from KeyValue"); + } + + break; + case isset($sxe->Signature->KeyInfo->KeyValue->RSAKeyValue): + + if(!isset($sxe->Signature->KeyInfo->KeyValue->RSAKeyValue->Modulus) || + !isset($sxe->Signature->KeyInfo->KeyValue->RSAKeyValue->Exponent)) { + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("RSA Key Value not in Modulus/Exponent form"); + } + + $modulus = base64_decode((string)$sxe->Signature->KeyInfo->KeyValue->RSAKeyValue->Modulus); + $exponent = base64_decode((string)$sxe->Signature->KeyInfo->KeyValue->RSAKeyValue->Exponent); + + $pem_public_key = self::_getPublicKeyFromModExp($modulus, $exponent); + + $public_key = openssl_pkey_get_public ($pem_public_key); + + break; + default: + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Unable to determine or unsupported representation of the KeyValue block"); + } + + $transformer = new Zend_InfoCard_Xml_Security_Transform(); + $transformer->addTransform((string)$sxe->Signature->SignedInfo->CanonicalizationMethod['Algorithm']); + + // The way we are doing our XML processing requires that we specifically add this + // (even though it's in the parent-block).. otherwise, our canonical form + // fails signature verification + $sxe->Signature->SignedInfo->addAttribute('xmlns', 'http://www.w3.org/2000/09/xmldsig#'); + + $canonical_signedinfo = $transformer->applyTransforms($sxe->Signature->SignedInfo->asXML()); + + if(@openssl_verify($canonical_signedinfo, $signatureValue, $public_key)) { + return (string)$sxe->Signature->SignedInfo->Reference['URI']; + } + + return false; + } + + /** + * Transform an RSA Key in Modulus/Exponent format into a PEM encoding and + * return an openssl resource for it + * + * @param string $modulus The RSA Modulus in binary format + * @param string $exponent The RSA exponent in binary format + * @return string The PEM encoded version of the key + */ + static protected function _getPublicKeyFromModExp($modulus, $exponent) + { + $modulusInteger = self::_encodeValue($modulus, self::ASN_TYPE_INTEGER); + $exponentInteger = self::_encodeValue($exponent, self::ASN_TYPE_INTEGER); + $modExpSequence = self::_encodeValue($modulusInteger . $exponentInteger, self::ASN_TYPE_SEQUENCE); + $modExpBitString = self::_encodeValue($modExpSequence, self::ASN_TYPE_BITSTRING); + + $binRsaKeyIdentifier = pack( "H*", self::RSA_KEY_IDENTIFIER ); + + $publicKeySequence = self::_encodeValue($binRsaKeyIdentifier . $modExpBitString, self::ASN_TYPE_SEQUENCE); + + $publicKeyInfoBase64 = base64_encode( $publicKeySequence ); + + $publicKeyString = "-----BEGIN PUBLIC KEY-----\n"; + $publicKeyString .= wordwrap($publicKeyInfoBase64, 64, "\n", true); + $publicKeyString .= "\n-----END PUBLIC KEY-----\n"; + + return $publicKeyString; + } + + /** + * Encode a limited set of data types into ASN.1 encoding format + * which is used in X.509 certificates + * + * @param string $data The data to encode + * @param const $type The encoding format constant + * @return string The encoded value + * @throws Zend_InfoCard_Xml_Security_Exception + */ + static protected function _encodeValue($data, $type) + { + // Null pad some data when we get it (integer values > 128 and bitstrings) + if( (($type == self::ASN_TYPE_INTEGER) && (ord($data) > 0x7f)) || + ($type == self::ASN_TYPE_BITSTRING)) { + $data = "\0$data"; + } + + $len = strlen($data); + + // encode the value based on length of the string + // I'm fairly confident that this is by no means a complete implementation + // but it is enough for our purposes + switch(true) { + case ($len < 128): + return sprintf("%c%c%s", $type, $len, $data); + case ($len < 0x0100): + return sprintf("%c%c%c%s", $type, 0x81, $len, $data); + case ($len < 0x010000): + return sprintf("%c%c%c%c%s", $type, 0x82, $len / 0x0100, $len % 0x0100, $data); + default: + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Could not encode value"); + } + + require_once 'Zend/InfoCard/Xml/Security/Exception.php'; + throw new Zend_InfoCard_Xml_Security_Exception("Invalid code path"); + } + + /** + * Securely compare two strings for equality while avoided C level memcmp() + * optimisations capable of leaking timing information useful to an attacker + * attempting to iteratively guess the unknown string (e.g. password) being + * compared against. + * + * @param string $a + * @param string $b + * @return bool + */ + static protected function _secureStringCompare($a, $b) + { + if (strlen($a) !== strlen($b)) { + return false; + } + $result = 0; + for ($i = 0; $i < strlen($a); $i++) { + $result |= ord($a[$i]) ^ ord($b[$i]); + } + return $result == 0; + } +}