mirror of
https://gerrit.wikimedia.org/r/mediawiki/extensions/OATHAuth
synced 2024-11-24 08:14:15 +00:00
106 lines
3.4 KiB
PHP
106 lines
3.4 KiB
PHP
|
<?php
|
||
|
|
||
|
/**
|
||
|
* Utility class for various OATH functions
|
||
|
*
|
||
|
* @ingroup Extensions
|
||
|
*/
|
||
|
class OATHAuthUtils {
|
||
|
|
||
|
/**
|
||
|
* Encrypt an aray of variables to put into the user's session. We use this
|
||
|
* when storing the user's password in their session. We can use json as the
|
||
|
* serialization format because $plaintextVars is an array of strings.
|
||
|
* @param array of user input strings
|
||
|
* @param int user_id, passed to key derivation functions so each user uses
|
||
|
* distinct encryption and hmac keys
|
||
|
* @return string encrypted data packet
|
||
|
*/
|
||
|
public static function encryptSessionData( array $plaintextVars, $userId ) {
|
||
|
$keyMaterial = self::getKeyMaterials();
|
||
|
$keys = self::getUserKeys( $keyMaterial, $userId );
|
||
|
return self::seal( json_encode( $plaintextVars ), $keys['encrypt'], $keys['hmac'] );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Decrypt an encrypted packet, generated with encryptSessionData
|
||
|
* @param string Encrypted data packet
|
||
|
* @return array of strings
|
||
|
*/
|
||
|
public static function decryptSessionData( $ciphertext, $userId ) {
|
||
|
$keyMaterial = self::getKeyMaterials();
|
||
|
$keys = self::getUserKeys( $keyMaterial, $userId );
|
||
|
return json_decode( self::unseal( $ciphertext, $keys['encrypt'], $keys['hmac'] ), true );
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Get the base secret for this wiki, used to derive all of the encryption
|
||
|
* keys. When $wgOATHAuthSecret is rotated, users who are part way through the
|
||
|
* two-step login will get an exception, and have to re-start the login.
|
||
|
* @return array $keys
|
||
|
*/
|
||
|
private static function getKeyMaterials() {
|
||
|
global $wgOATHAuthSecret, $wgSecretKey;
|
||
|
return $wgOATHAuthSecret ?: $wgSecretKey;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Generate encryption and hmac keys, unique to this user, based on a single
|
||
|
* wiki secret. Use a moderate pbkdf2 work factor in case we ever leak keys.
|
||
|
* @return array including key for encryption and integrity checking
|
||
|
*/
|
||
|
private static function getUserKeys( $secret, $userid ) {
|
||
|
$keymats = hash_pbkdf2( 'sha256', $secret, "oath-$userid", 10001, 64, true );
|
||
|
return array(
|
||
|
'encrypt' => substr( $keymats, 0, 32 ),
|
||
|
'hmac' => substr( $keymats, 32, 32 ),
|
||
|
);
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Actually encrypt the data, using a new random IV, and prepend the hmac
|
||
|
* of the encrypted data + IV, using a separate hmac key.
|
||
|
* @return $hmac.$iv.$ciphertext, each component b64 encoded
|
||
|
*/
|
||
|
private static function seal( $data, $encKey, $hmacKey ) {
|
||
|
$iv = MWCryptRand::generate( 16, true );
|
||
|
$ciphertext = openssl_encrypt(
|
||
|
$data,
|
||
|
'aes-256-ctr',
|
||
|
$encKey,
|
||
|
OPENSSL_RAW_DATA,
|
||
|
$iv
|
||
|
);
|
||
|
$sealed = base64_encode( $iv ) . '.' . base64_encode( $ciphertext );
|
||
|
$hmac = hash_hmac( 'sha256', $sealed, $hmacKey, true );
|
||
|
return base64_encode( $hmac ) . '.' . $sealed;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Decrypt data sealed using seal(). First checks the hmac to prevent various
|
||
|
* attacks.
|
||
|
* @return plaintext
|
||
|
*/
|
||
|
private static function unseal( $encrypted, $encKey, $hmacKey ) {
|
||
|
$pieces = explode( '.', $encrypted );
|
||
|
if ( count( $pieces ) !== 3 ) {
|
||
|
throw new InvalidArgumentException( 'Invalid sealed-secret format' );
|
||
|
}
|
||
|
|
||
|
list( $hmac, $iv, $ciphertext ) = $pieces;
|
||
|
$integCalc = hash_hmac( 'sha256', $iv . '.' . $ciphertext, $hmacKey, true );
|
||
|
if ( !hash_equals( $integCalc, base64_decode( $hmac ) ) ) {
|
||
|
throw new Exception( 'Sealed secret has been tampered with, aborting.' );
|
||
|
}
|
||
|
|
||
|
return openssl_decrypt(
|
||
|
base64_decode( $ciphertext ),
|
||
|
'aes-256-ctr',
|
||
|
$encKey,
|
||
|
OPENSSL_RAW_DATA,
|
||
|
base64_decode( $iv )
|
||
|
);
|
||
|
}
|
||
|
|
||
|
}
|