Files
idpan.poznan.pl/administrator/components/com_akeebabackup/webpush/WebPush/Encryption.php
2026-02-08 21:16:11 +01:00

476 lines
14 KiB
PHP

<?php
/**
* Akeeba WebPush
*
* An abstraction layer for easier implementation of WebPush in Joomla components.
*
* @copyright (c) 2022 Akeeba Ltd
* @license GNU GPL v3 or later; see LICENSE.txt
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*/
declare(strict_types=1);
namespace Akeeba\WebPush\WebPush;
use Akeeba\WebPush\ECC\Curve;
use Akeeba\WebPush\ECC\Point;
use Akeeba\WebPush\ECC\PrivateKey;
use Base64Url\Base64Url;
use Brick\Math\BigInteger;
use function mb_substr;
use function chr;
use function hex2bin;
use function is_array;
use function openssl_encrypt;
use function pack;
use function str_pad;
use function unpack;
use const false;
use const OPENSSL_RAW_DATA;
use const STR_PAD_LEFT;
/**
* This class is a derivative work based on the WebPush library by Louis Lagrange. It has been modified to only use
* dependencies shipped with Joomla itself and must not be confused with the original work.
*
* You can find the original code at https://github.com/web-push-libs
*
* The original code came with the following copyright notice:
*
* =====================================================================================================================
*
* This file is part of the WebPush library.
*
* (c) Louis Lagrange <lagrange.louis@gmail.com>
*
* For the full copyright and license information, please view the LICENSE-LAGRANGE.txt
* file that was distributed with this source code.
*
* =====================================================================================================================
*/
class Encryption
{
public const MAX_PAYLOAD_LENGTH = 4078;
public const MAX_COMPATIBILITY_PAYLOAD_LENGTH = 3052;
/**
* @param string $payload With padding
* @param string $userPublicKey Base 64 encoded (MIME or URL-safe)
* @param string $userAuthToken Base 64 encoded (MIME or URL-safe)
*
* @throws \ErrorException
*/
public static function encrypt(string $payload, string $userPublicKey, string $userAuthToken, string $contentEncoding): array
{
$localKeyData = self::createLocalKeyObjectUsingOpenSSL();
$salt = random_bytes(16);
$userPublicKey = Base64Url::decode($userPublicKey);
$userAuthToken = Base64Url::decode($userAuthToken);
// get local key pair
$localPublicKey = hex2bin(Utils::serializePublicKeyFromData($localKeyData));
if (!$localPublicKey)
{
throw new \ErrorException('Failed to convert local public key from hexadecimal to binary');
}
// get user public key object
[$userPublicKeyObjectX, $userPublicKeyObjectY] = Utils::unserializePublicKey($userPublicKey);
$userKeyData = [
'x' => $userPublicKeyObjectX,
'y' => $userPublicKeyObjectY,
];
// get shared secret from user public key and local private key
$sharedSecret = Encryption::calculateAgreementKey($localKeyData, $userKeyData);
$sharedSecret = str_pad($sharedSecret, 32, chr(0), STR_PAD_LEFT);
// section 4.3
$ikm = Encryption::getIKM($userAuthToken, $userPublicKey, $localPublicKey, $sharedSecret, $contentEncoding);
// section 4.2
$context = Encryption::createContext($userPublicKey, $localPublicKey, $contentEncoding);
// derive the Content Encryption Key
$contentEncryptionKeyInfo = Encryption::createInfo($contentEncoding, $context, $contentEncoding);
$contentEncryptionKey = Encryption::hkdf($salt, $ikm, $contentEncryptionKeyInfo, 16);
// section 3.3, derive the nonce
$nonceInfo = Encryption::createInfo('nonce', $context, $contentEncoding);
$nonce = Encryption::hkdf($salt, $ikm, $nonceInfo, 12);
// encrypt
// "The additional data passed to each invocation of AEAD_AES_128_GCM is a zero-length octet sequence."
$tag = '';
$encryptedText = openssl_encrypt($payload, 'aes-128-gcm', $contentEncryptionKey, OPENSSL_RAW_DATA, $nonce, $tag);
// return values in url safe base64
return [
'localPublicKey' => $localPublicKey,
'salt' => $salt,
'cipherText' => $encryptedText . $tag,
];
}
public static function getContentCodingHeader(string $salt, string $localPublicKey, string $contentEncoding): string
{
if ($contentEncoding === "aes128gcm")
{
return $salt
. pack('N*', 4096)
. pack('C*', Utils::safeStrlen($localPublicKey))
. $localPublicKey;
}
return "";
}
/**
* @return string padded payload (plaintext)
* @throws \ErrorException
*/
public static function padPayload(string $payload, int $maxLengthToPad, string $contentEncoding): string
{
$payloadLen = Utils::safeStrlen($payload);
$padLen = $maxLengthToPad ? $maxLengthToPad - $payloadLen : 0;
if ($contentEncoding === "aesgcm")
{
return pack('n*', $padLen) . str_pad($payload, $padLen + $payloadLen, chr(0), STR_PAD_LEFT);
}
elseif ($contentEncoding === "aes128gcm")
{
return str_pad($payload . chr(2), $padLen + $payloadLen, chr(0), STR_PAD_RIGHT);
}
else
{
throw new \ErrorException("This content encoding is not supported");
}
}
private static function addNullPadding(string $data): string
{
return str_pad($data, 32, chr(0), STR_PAD_LEFT);
}
private static function calculateAgreementKey(array $private_key, array $public_key): string
{
if (function_exists('openssl_pkey_derive'))
{
try
{
$publicPem = self::convertPublicKeyToPEM($public_key);
$private_key = array_map([Base64Url::class, 'encode'], $private_key);
$privatePem = self::convertPrivateKeyToPEM($private_key);
$result = openssl_pkey_derive($publicPem, $privatePem, 256);
if ($result === false)
{
throw new \Exception('Unable to compute the agreement key');
}
return $result;
}
catch (\Throwable $throwable)
{
//Does nothing. Will fallback to the pure PHP function
}
}
$curve = self::curve256();
$rec_x = self::convertBase64ToBigInteger($public_key['x']);
$rec_y = self::convertBase64ToBigInteger($public_key['y']);
$sen_d = self::convertBase64ToBigInteger($private_key['d']);
$priv_key = PrivateKey::create($sen_d);
$pub_key = $curve->getPublicKeyFrom($rec_x, $rec_y);
return hex2bin(str_pad($curve->mul($pub_key->getPoint(), $priv_key->getSecret())->getX()->toBase(16), 64, '0', STR_PAD_LEFT));
}
/**
* @throws \ErrorException
*/
private static function convertBase64ToBigInteger(string $value): BigInteger
{
try
{
$value = unpack('H*', Base64Url::decode($value));
}
catch (\Exception $e)
{
$value = unpack('H*', $value);
}
if ($value === false)
{
throw new \ErrorException('Unable to unpack hex value from string');
}
return BigInteger::fromBase($value[1], 16);
}
/**
* @throws \ErrorException
*/
private static function convertBase64ToGMP(string $value): \GMP
{
$value = unpack('H*', Base64Url::decode($value));
if ($value === false)
{
throw new \ErrorException('Unable to unpack hex value from string');
}
return gmp_init($value[1], 16);
}
/**
* Creates a context for deriving encryption parameters.
* See section 4.2 of
* {@link https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-00}
* From {@link https://github.com/GoogleChrome/push-encryption-node/blob/master/src/encrypt.js}.
*
* @param string $clientPublicKey The client's public key
* @param string $serverPublicKey Our public key
*
* @throws \ErrorException
*/
private static function createContext(string $clientPublicKey, string $serverPublicKey, string $contentEncoding): ?string
{
if ($contentEncoding === "aes128gcm")
{
return null;
}
if (Utils::safeStrlen($clientPublicKey) !== 65)
{
throw new \ErrorException('Invalid client public key length');
}
// This one should never happen, because it's our code that generates the key
if (Utils::safeStrlen($serverPublicKey) !== 65)
{
throw new \ErrorException('Invalid server public key length');
}
$len = chr(0) . 'A'; // 65 as Uint16BE
return chr(0) . $len . $clientPublicKey . $len . $serverPublicKey;
}
/**
* Returns an info record. See sections 3.2 and 3.3 of
* {@link https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-00}
* From {@link https://github.com/GoogleChrome/push-encryption-node/blob/master/src/encrypt.js}.
*
* @param string $type The type of the info record
* @param string|null $context The context for the record
*
* @throws \ErrorException
*/
private static function createInfo(string $type, ?string $context, string $contentEncoding): string
{
if ($contentEncoding === "aesgcm")
{
if (!$context)
{
throw new \ErrorException('Context must exist');
}
if (Utils::safeStrlen($context) !== 135)
{
throw new \ErrorException('Context argument has invalid size');
}
return 'Content-Encoding: ' . $type . chr(0) . 'P-256' . $context;
}
elseif ($contentEncoding === "aes128gcm")
{
return 'Content-Encoding: ' . $type . chr(0);
}
throw new \ErrorException('This content encoding is not supported.');
}
private static function createLocalKeyObjectUsingOpenSSL(): array
{
$keyResource = openssl_pkey_new([
'curve_name' => 'prime256v1',
'private_key_type' => OPENSSL_KEYTYPE_EC,
]);
if (!$keyResource)
{
throw new \RuntimeException('Unable to create the key');
}
$details = openssl_pkey_get_details($keyResource);
if (PHP_MAJOR_VERSION < 8)
{
openssl_pkey_free($keyResource);
}
if (!$details)
{
throw new \RuntimeException('Unable to get the key details');
}
return [
'x' => self::addNullPadding($details['ec']['x']),
'y' => self::addNullPadding($details['ec']['y']),
'd' => self::addNullPadding($details['ec']['d']),
];
}
/**
* @throws \ErrorException
*/
private static function getIKM(string $userAuthToken, string $userPublicKey, string $localPublicKey, string $sharedSecret, string $contentEncoding): string
{
if (!empty($userAuthToken))
{
if ($contentEncoding === "aesgcm")
{
$info = 'Content-Encoding: auth' . chr(0);
}
elseif ($contentEncoding === "aes128gcm")
{
$info = "WebPush: info" . chr(0) . $userPublicKey . $localPublicKey;
}
else
{
throw new \ErrorException("This content encoding is not supported");
}
return self::hkdf($userAuthToken, $sharedSecret, $info, 32);
}
return $sharedSecret;
}
/**
* HMAC-based Extract-and-Expand Key Derivation Function (HKDF).
*
* This is used to derive a secure encryption key from a mostly-secure shared
* secret.
*
* This is a partial implementation of HKDF tailored to our specific purposes.
* In particular, for us the value of N will always be 1, and thus T always
* equals HMAC-Hash(PRK, info | 0x01).
*
* See {@link https://www.rfc-editor.org/rfc/rfc5869.txt}
* From {@link https://github.com/GoogleChrome/push-encryption-node/blob/master/src/encrypt.js}
*
* @param string $salt A non-secret random value
* @param string $ikm Input keying material
* @param string $info Application-specific context
* @param int $length The length (in bytes) of the required output key
*/
private static function hkdf(string $salt, string $ikm, string $info, int $length): string
{
// extract
$prk = hash_hmac('sha256', $ikm, $salt, true);
// expand
return mb_substr(hash_hmac('sha256', $info . chr(1), $prk, true), 0, $length, '8bit');
}
/**
* @throws \InvalidArgumentException if the curve is not supported
*/
public static function convertPublicKeyToPEM(array $keyData): string
{
$der = pack(
'H*',
'3059' // SEQUENCE, length 89
.'3013' // SEQUENCE, length 19
.'0607' // OID, length 7
.'2a8648ce3d0201' // 1.2.840.10045.2.1 = EC Public Key
.'0608' // OID, length 8
.'2a8648ce3d030107' // 1.2.840.10045.3.1.7 = P-256 Curve
.'0342' // BIT STRING, length 66
.'00' // prepend with NUL - pubkey will follow
);
$der .= "\04"
. str_pad($keyData['x'], 32, "\0", STR_PAD_LEFT)
. str_pad($keyData['y'], 32, "\0", STR_PAD_LEFT);
$pem = '-----BEGIN PUBLIC KEY-----'.PHP_EOL;
$pem .= chunk_split(base64_encode($der), 64, PHP_EOL);
$pem .= '-----END PUBLIC KEY-----'.PHP_EOL;
return $pem;
}
/**
* @throws \InvalidArgumentException if the curve is not supported
*/
public static function convertPrivateKeyToPEM(array $keyData): string
{
$d = unpack('H*', str_pad(Base64Url::decode($keyData['d']), 32, "\0", STR_PAD_LEFT));
if (!is_array($d) || !isset($d[1]))
{
throw new \InvalidArgumentException('Unable to get the private key');
}
$der = pack(
'H*',
'3077' // SEQUENCE, length 87+length($d)=32
. '020101' // INTEGER, 1
. '0420' // OCTET STRING, length($d) = 32
. $d[1]
. 'a00a' // TAGGED OBJECT #0, length 10
. '0608' // OID, length 8
. '2a8648ce3d030107' // 1.3.132.0.34 = P-256 Curve
. 'a144' // TAGGED OBJECT #1, length 68
. '0342' // BIT STRING, length 66
. '00' // prepend with NUL - pubkey will follow
);
$der .= "\04"
. str_pad(Base64Url::decode($keyData['x']), 32, "\0", STR_PAD_LEFT)
. str_pad(Base64Url::decode($keyData['y']), 32, "\0", STR_PAD_LEFT);
$pem = '-----BEGIN EC PRIVATE KEY-----'.PHP_EOL;
$pem .= chunk_split(base64_encode($der), 64, PHP_EOL);
$pem .= '-----END EC PRIVATE KEY-----'.PHP_EOL;
return $pem;
}
/**
* Returns an NIST P-256 curve.
*/
private static function curve256(): Curve
{
$p = BigInteger::fromBase('ffffffff00000001000000000000000000000000ffffffffffffffffffffffff', 16);
$a = BigInteger::fromBase('ffffffff00000001000000000000000000000000fffffffffffffffffffffffc', 16);
$b = BigInteger::fromBase('5ac635d8aa3a93e7b3ebbd55769886bc651d06b0cc53b0f63bce3c3e27d2604b', 16);
$x = BigInteger::fromBase('6b17d1f2e12c4247f8bce6e563a440f277037d812deb33a0f4a13945d898c296', 16);
$y = BigInteger::fromBase('4fe342e2fe1a7f9b8ee7eb4a7c0f9e162bce33576b315ececbb6406837bf51f5', 16);
$n = BigInteger::fromBase('ffffffff00000000ffffffffffffffffbce6faada7179e84f3b9cac2fc632551', 16);
$generator = Point::create($x, $y, $n);
return new Curve(256, $p, $a, $b, $generator);
}
}