12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528552955305531553255335534553555365537553855395540554155425543554455455546554755485549555055515552555355545555555655575558555955605561556255635564556555665567556855695570557155725573557455755576557755785579558055815582558355845585558655875588558955905591559255935594559555965597559855995600560156025603560456055606560756085609561056115612561356145615561656175618561956205621562256235624562556265627562856295630563156325633563456355636563756385639564056415642564356445645564656475648564956505651565256535654565556565657565856595660566156625663566456655666566756685669567056715672567356745675567656775678567956805681568256835684568556865687568856895690569156925693569456955696569756985699570057015702570357045705570657075708570957105711571257135714571557165717571857195720572157225723572457255726572757285729573057315732573357345735573657375738573957405741574257435744574557465747574857495750575157525753575457555756575757585759576057615762576357645765576657675768576957705771577257735774577557765777577857795780578157825783578457855786578757885789579057915792579357945795579657975798579958005801580258035804580558065807580858095810581158125813581458155816581758185819582058215822582358245825582658275828582958305831583258335834583558365837583858395840584158425843584458455846584758485849585058515852585358545855585658575858585958605861586258635864586558665867586858695870587158725873587458755876587758785879588058815882588358845885588658875888588958905891589258935894589558965897589858995900590159025903590459055906590759085909591059115912591359145915591659175918591959205921592259235924592559265927592859295930593159325933593459355936593759385939594059415942594359445945594659475948594959505951595259535954595559565957595859595960596159625963596459655966596759685969597059715972597359745975597659775978597959805981598259835984598559865987598859895990599159925993599459955996599759985999600060016002600360046005600660076008600960106011601260136014601560166017601860196020602160226023602460256026602760286029603060316032603360346035603660376038603960406041604260436044604560466047604860496050605160526053605460556056605760586059606060616062606360646065606660676068606960706071607260736074607560766077607860796080608160826083608460856086608760886089609060916092609360946095609660976098609961006101610261036104610561066107610861096110611161126113611461156116611761186119612061216122612361246125612661276128612961306131613261336134613561366137613861396140614161426143614461456146614761486149615061516152615361546155615661576158615961606161616261636164616561666167616861696170617161726173617461756176617761786179618061816182618361846185618661876188618961906191619261936194619561966197619861996200620162026203620462056206620762086209621062116212621362146215621662176218621962206221622262236224622562266227622862296230623162326233623462356236623762386239624062416242624362446245624662476248624962506251625262536254625562566257625862596260626162626263626462656266626762686269627062716272627362746275627662776278627962806281628262836284628562866287628862896290629162926293629462956296629762986299630063016302630363046305630663076308630963106311631263136314631563166317631863196320632163226323632463256326632763286329633063316332633363346335633663376338633963406341634263436344634563466347634863496350635163526353635463556356635763586359636063616362636363646365636663676368636963706371637263736374637563766377637863796380638163826383638463856386638763886389639063916392639363946395639663976398639964006401640264036404640564066407640864096410641164126413641464156416641764186419642064216422642364246425642664276428642964306431643264336434643564366437643864396440644164426443644464456446644764486449645064516452645364546455645664576458645964606461646264636464646564666467646864696470647164726473647464756476647764786479648064816482648364846485648664876488648964906491649264936494649564966497649864996500650165026503650465056506650765086509651065116512651365146515651665176518651965206521652265236524652565266527652865296530653165326533653465356536653765386539654065416542654365446545654665476548654965506551655265536554655565566557655865596560656165626563656465656566656765686569657065716572657365746575657665776578657965806581658265836584658565866587658865896590659165926593659465956596659765986599660066016602660366046605660666076608660966106611661266136614661566166617661866196620662166226623662466256626662766286629663066316632663366346635663666376638663966406641664266436644664566466647664866496650665166526653665466556656665766586659666066616662666366646665666666676668666966706671667266736674667566766677667866796680668166826683668466856686668766886689669066916692669366946695669666976698669967006701670267036704670567066707670867096710671167126713671467156716671767186719672067216722672367246725672667276728672967306731673267336734673567366737673867396740674167426743674467456746674767486749675067516752675367546755675667576758675967606761676267636764676567666767676867696770677167726773677467756776677767786779678067816782678367846785678667876788678967906791679267936794679567966797679867996800680168026803680468056806680768086809681068116812681368146815681668176818681968206821682268236824682568266827682868296830683168326833683468356836683768386839684068416842684368446845684668476848684968506851685268536854685568566857685868596860686168626863686468656866686768686869687068716872687368746875687668776878687968806881688268836884 |
- #ifdef HAVE_CONFIG_H
- #include "config.h"
- #endif
- #include "php.h"
- #include "php_ini.h"
- #include "php_openssl.h"
- #include "ext/standard/file.h"
- #include "ext/standard/info.h"
- #include "ext/standard/php_fopen_wrappers.h"
- #include "ext/standard/md5.h"
- #include "ext/standard/base64.h"
- #ifdef PHP_WIN32
- # include "win32/winutil.h"
- #endif
- #include <openssl/evp.h>
- #include <openssl/bn.h>
- #include <openssl/rsa.h>
- #include <openssl/dsa.h>
- #include <openssl/dh.h>
- #include <openssl/x509.h>
- #include <openssl/x509v3.h>
- #include <openssl/crypto.h>
- #include <openssl/pem.h>
- #include <openssl/err.h>
- #include <openssl/conf.h>
- #include <openssl/rand.h>
- #include <openssl/ssl.h>
- #include <openssl/pkcs12.h>
- #include <time.h>
- #if (defined(PHP_WIN32) && defined(_MSC_VER) && _MSC_VER >= 1900)
- #define timezone _timezone
- #endif
- #define MIN_KEY_LENGTH 384
- #define OPENSSL_ALGO_SHA1 1
- #define OPENSSL_ALGO_MD5 2
- #define OPENSSL_ALGO_MD4 3
- #ifdef HAVE_OPENSSL_MD2_H
- #define OPENSSL_ALGO_MD2 4
- #endif
- #if PHP_OPENSSL_API_VERSION < 0x10100
- #define OPENSSL_ALGO_DSS1 5
- #endif
- #define OPENSSL_ALGO_SHA224 6
- #define OPENSSL_ALGO_SHA256 7
- #define OPENSSL_ALGO_SHA384 8
- #define OPENSSL_ALGO_SHA512 9
- #define OPENSSL_ALGO_RMD160 10
- #define DEBUG_SMIME 0
- #if !defined(OPENSSL_NO_EC) && defined(EVP_PKEY_EC)
- #define HAVE_EVP_PKEY_EC 1
- #endif
- ZEND_DECLARE_MODULE_GLOBALS(openssl)
- enum php_openssl_key_type {
- OPENSSL_KEYTYPE_RSA,
- OPENSSL_KEYTYPE_DSA,
- OPENSSL_KEYTYPE_DH,
- OPENSSL_KEYTYPE_DEFAULT = OPENSSL_KEYTYPE_RSA,
- #ifdef HAVE_EVP_PKEY_EC
- OPENSSL_KEYTYPE_EC = OPENSSL_KEYTYPE_DH +1
- #endif
- };
- enum php_openssl_cipher_type {
- PHP_OPENSSL_CIPHER_RC2_40,
- PHP_OPENSSL_CIPHER_RC2_128,
- PHP_OPENSSL_CIPHER_RC2_64,
- PHP_OPENSSL_CIPHER_DES,
- PHP_OPENSSL_CIPHER_3DES,
- PHP_OPENSSL_CIPHER_AES_128_CBC,
- PHP_OPENSSL_CIPHER_AES_192_CBC,
- PHP_OPENSSL_CIPHER_AES_256_CBC,
- PHP_OPENSSL_CIPHER_DEFAULT = PHP_OPENSSL_CIPHER_RC2_40
- };
- PHP_FUNCTION(openssl_get_md_methods);
- PHP_FUNCTION(openssl_get_cipher_methods);
- #ifdef HAVE_EVP_PKEY_EC
- PHP_FUNCTION(openssl_get_curve_names);
- #endif
- PHP_FUNCTION(openssl_digest);
- PHP_FUNCTION(openssl_encrypt);
- PHP_FUNCTION(openssl_decrypt);
- PHP_FUNCTION(openssl_cipher_iv_length);
- PHP_FUNCTION(openssl_dh_compute_key);
- PHP_FUNCTION(openssl_pkey_derive);
- PHP_FUNCTION(openssl_random_pseudo_bytes);
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_x509_export_to_file, 0, 0, 2)
- ZEND_ARG_INFO(0, x509)
- ZEND_ARG_INFO(0, outfilename)
- ZEND_ARG_INFO(0, notext)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_x509_export, 0, 0, 2)
- ZEND_ARG_INFO(0, x509)
- ZEND_ARG_INFO(1, out)
- ZEND_ARG_INFO(0, notext)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_x509_fingerprint, 0, 0, 1)
- ZEND_ARG_INFO(0, x509)
- ZEND_ARG_INFO(0, method)
- ZEND_ARG_INFO(0, raw_output)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_x509_check_private_key, 0)
- ZEND_ARG_INFO(0, cert)
- ZEND_ARG_INFO(0, key)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_x509_parse, 0, 0, 1)
- ZEND_ARG_INFO(0, x509)
- ZEND_ARG_INFO(0, shortname)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_x509_checkpurpose, 0, 0, 2)
- ZEND_ARG_INFO(0, x509cert)
- ZEND_ARG_INFO(0, purpose)
- ZEND_ARG_INFO(0, cainfo)
- ZEND_ARG_INFO(0, untrustedfile)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_x509_read, 0)
- ZEND_ARG_INFO(0, cert)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_x509_free, 0)
- ZEND_ARG_INFO(0, x509)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pkcs12_export_to_file, 0, 0, 4)
- ZEND_ARG_INFO(0, x509)
- ZEND_ARG_INFO(0, filename)
- ZEND_ARG_INFO(0, priv_key)
- ZEND_ARG_INFO(0, pass)
- ZEND_ARG_INFO(0, args)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pkcs12_export, 0, 0, 4)
- ZEND_ARG_INFO(0, x509)
- ZEND_ARG_INFO(1, out)
- ZEND_ARG_INFO(0, priv_key)
- ZEND_ARG_INFO(0, pass)
- ZEND_ARG_INFO(0, args)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_pkcs12_read, 0)
- ZEND_ARG_INFO(0, PKCS12)
- ZEND_ARG_INFO(1, certs)
- ZEND_ARG_INFO(0, pass)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_csr_export_to_file, 0, 0, 2)
- ZEND_ARG_INFO(0, csr)
- ZEND_ARG_INFO(0, outfilename)
- ZEND_ARG_INFO(0, notext)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_csr_export, 0, 0, 2)
- ZEND_ARG_INFO(0, csr)
- ZEND_ARG_INFO(1, out)
- ZEND_ARG_INFO(0, notext)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_csr_sign, 0, 0, 4)
- ZEND_ARG_INFO(0, csr)
- ZEND_ARG_INFO(0, x509)
- ZEND_ARG_INFO(0, priv_key)
- ZEND_ARG_INFO(0, days)
- ZEND_ARG_INFO(0, config_args)
- ZEND_ARG_INFO(0, serial)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_csr_new, 0, 0, 2)
- ZEND_ARG_INFO(0, dn)
- ZEND_ARG_INFO(1, privkey)
- ZEND_ARG_INFO(0, configargs)
- ZEND_ARG_INFO(0, extraattribs)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_csr_get_subject, 0, 0, 1)
- ZEND_ARG_INFO(0, csr)
- ZEND_ARG_INFO(0, use_shortnames)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_csr_get_public_key, 0, 0, 1)
- ZEND_ARG_INFO(0, csr)
- ZEND_ARG_INFO(0, use_shortnames)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pkey_new, 0, 0, 0)
- ZEND_ARG_INFO(0, configargs)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pkey_export_to_file, 0, 0, 2)
- ZEND_ARG_INFO(0, key)
- ZEND_ARG_INFO(0, outfilename)
- ZEND_ARG_INFO(0, passphrase)
- ZEND_ARG_INFO(0, config_args)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pkey_export, 0, 0, 2)
- ZEND_ARG_INFO(0, key)
- ZEND_ARG_INFO(1, out)
- ZEND_ARG_INFO(0, passphrase)
- ZEND_ARG_INFO(0, config_args)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_pkey_get_public, 0)
- ZEND_ARG_INFO(0, cert)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_pkey_free, 0)
- ZEND_ARG_INFO(0, key)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pkey_get_private, 0, 0, 1)
- ZEND_ARG_INFO(0, key)
- ZEND_ARG_INFO(0, passphrase)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_pkey_get_details, 0)
- ZEND_ARG_INFO(0, key)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pbkdf2, 0, 0, 4)
- ZEND_ARG_INFO(0, password)
- ZEND_ARG_INFO(0, salt)
- ZEND_ARG_INFO(0, key_length)
- ZEND_ARG_INFO(0, iterations)
- ZEND_ARG_INFO(0, digest_algorithm)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pkcs7_verify, 0, 0, 2)
- ZEND_ARG_INFO(0, filename)
- ZEND_ARG_INFO(0, flags)
- ZEND_ARG_INFO(0, signerscerts)
- ZEND_ARG_INFO(0, cainfo)
- ZEND_ARG_INFO(0, extracerts)
- ZEND_ARG_INFO(0, content)
- ZEND_ARG_INFO(0, pk7)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pkcs7_encrypt, 0, 0, 4)
- ZEND_ARG_INFO(0, infile)
- ZEND_ARG_INFO(0, outfile)
- ZEND_ARG_INFO(0, recipcerts)
- ZEND_ARG_INFO(0, headers)
- ZEND_ARG_INFO(0, flags)
- ZEND_ARG_INFO(0, cipher)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pkcs7_sign, 0, 0, 5)
- ZEND_ARG_INFO(0, infile)
- ZEND_ARG_INFO(0, outfile)
- ZEND_ARG_INFO(0, signcert)
- ZEND_ARG_INFO(0, signkey)
- ZEND_ARG_INFO(0, headers)
- ZEND_ARG_INFO(0, flags)
- ZEND_ARG_INFO(0, extracertsfilename)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pkcs7_decrypt, 0, 0, 3)
- ZEND_ARG_INFO(0, infilename)
- ZEND_ARG_INFO(0, outfilename)
- ZEND_ARG_INFO(0, recipcert)
- ZEND_ARG_INFO(0, recipkey)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pkcs7_read, 0, 0, 2)
- ZEND_ARG_INFO(0, infilename)
- ZEND_ARG_INFO(1, certs)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_private_encrypt, 0, 0, 3)
- ZEND_ARG_INFO(0, data)
- ZEND_ARG_INFO(1, crypted)
- ZEND_ARG_INFO(0, key)
- ZEND_ARG_INFO(0, padding)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_private_decrypt, 0, 0, 3)
- ZEND_ARG_INFO(0, data)
- ZEND_ARG_INFO(1, crypted)
- ZEND_ARG_INFO(0, key)
- ZEND_ARG_INFO(0, padding)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_public_encrypt, 0, 0, 3)
- ZEND_ARG_INFO(0, data)
- ZEND_ARG_INFO(1, crypted)
- ZEND_ARG_INFO(0, key)
- ZEND_ARG_INFO(0, padding)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_public_decrypt, 0, 0, 3)
- ZEND_ARG_INFO(0, data)
- ZEND_ARG_INFO(1, crypted)
- ZEND_ARG_INFO(0, key)
- ZEND_ARG_INFO(0, padding)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_error_string, 0)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_sign, 0, 0, 3)
- ZEND_ARG_INFO(0, data)
- ZEND_ARG_INFO(1, signature)
- ZEND_ARG_INFO(0, key)
- ZEND_ARG_INFO(0, method)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_verify, 0, 0, 3)
- ZEND_ARG_INFO(0, data)
- ZEND_ARG_INFO(0, signature)
- ZEND_ARG_INFO(0, key)
- ZEND_ARG_INFO(0, method)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_seal, 0, 0, 4)
- ZEND_ARG_INFO(0, data)
- ZEND_ARG_INFO(1, sealdata)
- ZEND_ARG_INFO(1, ekeys)
- ZEND_ARG_INFO(0, pubkeys)
- ZEND_ARG_INFO(0, method)
- ZEND_ARG_INFO(1, iv)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_open, 0, 0, 4)
- ZEND_ARG_INFO(0, data)
- ZEND_ARG_INFO(1, opendata)
- ZEND_ARG_INFO(0, ekey)
- ZEND_ARG_INFO(0, privkey)
- ZEND_ARG_INFO(0, method)
- ZEND_ARG_INFO(0, iv)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_get_md_methods, 0, 0, 0)
- ZEND_ARG_INFO(0, aliases)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_get_cipher_methods, 0, 0, 0)
- ZEND_ARG_INFO(0, aliases)
- ZEND_END_ARG_INFO()
- #ifdef HAVE_EVP_PKEY_EC
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_get_curve_names, 0, 0, 0)
- ZEND_END_ARG_INFO()
- #endif
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_digest, 0, 0, 2)
- ZEND_ARG_INFO(0, data)
- ZEND_ARG_INFO(0, method)
- ZEND_ARG_INFO(0, raw_output)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_encrypt, 0, 0, 3)
- ZEND_ARG_INFO(0, data)
- ZEND_ARG_INFO(0, method)
- ZEND_ARG_INFO(0, password)
- ZEND_ARG_INFO(0, options)
- ZEND_ARG_INFO(0, iv)
- ZEND_ARG_INFO(1, tag)
- ZEND_ARG_INFO(0, aad)
- ZEND_ARG_INFO(0, tag_length)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_decrypt, 0, 0, 3)
- ZEND_ARG_INFO(0, data)
- ZEND_ARG_INFO(0, method)
- ZEND_ARG_INFO(0, password)
- ZEND_ARG_INFO(0, options)
- ZEND_ARG_INFO(0, iv)
- ZEND_ARG_INFO(0, tag)
- ZEND_ARG_INFO(0, aad)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_cipher_iv_length, 0)
- ZEND_ARG_INFO(0, method)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_dh_compute_key, 0)
- ZEND_ARG_INFO(0, pub_key)
- ZEND_ARG_INFO(0, dh_key)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_pkey_derive, 0, 0, 2)
- ZEND_ARG_INFO(0, peer_pub_key)
- ZEND_ARG_INFO(0, priv_key)
- ZEND_ARG_INFO(0, keylen)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_random_pseudo_bytes, 0, 0, 1)
- ZEND_ARG_INFO(0, length)
- ZEND_ARG_INFO(1, result_is_strong)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO_EX(arginfo_openssl_spki_new, 0, 0, 2)
- ZEND_ARG_INFO(0, privkey)
- ZEND_ARG_INFO(0, challenge)
- ZEND_ARG_INFO(0, algo)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_spki_verify, 0)
- ZEND_ARG_INFO(0, spki)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_spki_export, 0)
- ZEND_ARG_INFO(0, spki)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_spki_export_challenge, 0)
- ZEND_ARG_INFO(0, spki)
- ZEND_END_ARG_INFO()
- ZEND_BEGIN_ARG_INFO(arginfo_openssl_get_cert_locations, 0)
- ZEND_END_ARG_INFO()
- static const zend_function_entry openssl_functions[] = {
- PHP_FE(openssl_get_cert_locations, arginfo_openssl_get_cert_locations)
- PHP_FE(openssl_spki_new, arginfo_openssl_spki_new)
- PHP_FE(openssl_spki_verify, arginfo_openssl_spki_verify)
- PHP_FE(openssl_spki_export, arginfo_openssl_spki_export)
- PHP_FE(openssl_spki_export_challenge, arginfo_openssl_spki_export_challenge)
- PHP_FE(openssl_pkey_free, arginfo_openssl_pkey_free)
- PHP_FE(openssl_pkey_new, arginfo_openssl_pkey_new)
- PHP_FE(openssl_pkey_export, arginfo_openssl_pkey_export)
- PHP_FE(openssl_pkey_export_to_file, arginfo_openssl_pkey_export_to_file)
- PHP_FE(openssl_pkey_get_private, arginfo_openssl_pkey_get_private)
- PHP_FE(openssl_pkey_get_public, arginfo_openssl_pkey_get_public)
- PHP_FE(openssl_pkey_get_details, arginfo_openssl_pkey_get_details)
- PHP_FALIAS(openssl_free_key, openssl_pkey_free, arginfo_openssl_pkey_free)
- PHP_FALIAS(openssl_get_privatekey, openssl_pkey_get_private, arginfo_openssl_pkey_get_private)
- PHP_FALIAS(openssl_get_publickey, openssl_pkey_get_public, arginfo_openssl_pkey_get_public)
- PHP_FE(openssl_x509_read, arginfo_openssl_x509_read)
- PHP_FE(openssl_x509_free, arginfo_openssl_x509_free)
- PHP_FE(openssl_x509_parse, arginfo_openssl_x509_parse)
- PHP_FE(openssl_x509_checkpurpose, arginfo_openssl_x509_checkpurpose)
- PHP_FE(openssl_x509_check_private_key, arginfo_openssl_x509_check_private_key)
- PHP_FE(openssl_x509_export, arginfo_openssl_x509_export)
- PHP_FE(openssl_x509_fingerprint, arginfo_openssl_x509_fingerprint)
- PHP_FE(openssl_x509_export_to_file, arginfo_openssl_x509_export_to_file)
- PHP_FE(openssl_pkcs12_export, arginfo_openssl_pkcs12_export)
- PHP_FE(openssl_pkcs12_export_to_file, arginfo_openssl_pkcs12_export_to_file)
- PHP_FE(openssl_pkcs12_read, arginfo_openssl_pkcs12_read)
- PHP_FE(openssl_csr_new, arginfo_openssl_csr_new)
- PHP_FE(openssl_csr_export, arginfo_openssl_csr_export)
- PHP_FE(openssl_csr_export_to_file, arginfo_openssl_csr_export_to_file)
- PHP_FE(openssl_csr_sign, arginfo_openssl_csr_sign)
- PHP_FE(openssl_csr_get_subject, arginfo_openssl_csr_get_subject)
- PHP_FE(openssl_csr_get_public_key, arginfo_openssl_csr_get_public_key)
- PHP_FE(openssl_digest, arginfo_openssl_digest)
- PHP_FE(openssl_encrypt, arginfo_openssl_encrypt)
- PHP_FE(openssl_decrypt, arginfo_openssl_decrypt)
- PHP_FE(openssl_cipher_iv_length, arginfo_openssl_cipher_iv_length)
- PHP_FE(openssl_sign, arginfo_openssl_sign)
- PHP_FE(openssl_verify, arginfo_openssl_verify)
- PHP_FE(openssl_seal, arginfo_openssl_seal)
- PHP_FE(openssl_open, arginfo_openssl_open)
- PHP_FE(openssl_pbkdf2, arginfo_openssl_pbkdf2)
- PHP_FE(openssl_pkcs7_verify, arginfo_openssl_pkcs7_verify)
- PHP_FE(openssl_pkcs7_decrypt, arginfo_openssl_pkcs7_decrypt)
- PHP_FE(openssl_pkcs7_sign, arginfo_openssl_pkcs7_sign)
- PHP_FE(openssl_pkcs7_encrypt, arginfo_openssl_pkcs7_encrypt)
- PHP_FE(openssl_pkcs7_read, arginfo_openssl_pkcs7_read)
- PHP_FE(openssl_private_encrypt, arginfo_openssl_private_encrypt)
- PHP_FE(openssl_private_decrypt, arginfo_openssl_private_decrypt)
- PHP_FE(openssl_public_encrypt, arginfo_openssl_public_encrypt)
- PHP_FE(openssl_public_decrypt, arginfo_openssl_public_decrypt)
- PHP_FE(openssl_get_md_methods, arginfo_openssl_get_md_methods)
- PHP_FE(openssl_get_cipher_methods, arginfo_openssl_get_cipher_methods)
- #ifdef HAVE_EVP_PKEY_EC
- PHP_FE(openssl_get_curve_names, arginfo_openssl_get_curve_names)
- #endif
- PHP_FE(openssl_dh_compute_key, arginfo_openssl_dh_compute_key)
- PHP_FE(openssl_pkey_derive, arginfo_openssl_pkey_derive)
- PHP_FE(openssl_random_pseudo_bytes, arginfo_openssl_random_pseudo_bytes)
- PHP_FE(openssl_error_string, arginfo_openssl_error_string)
- PHP_FE_END
- };
- zend_module_entry openssl_module_entry = {
- STANDARD_MODULE_HEADER,
- "openssl",
- openssl_functions,
- PHP_MINIT(openssl),
- PHP_MSHUTDOWN(openssl),
- NULL,
- NULL,
- PHP_MINFO(openssl),
- PHP_OPENSSL_VERSION,
- PHP_MODULE_GLOBALS(openssl),
- PHP_GINIT(openssl),
- PHP_GSHUTDOWN(openssl),
- NULL,
- STANDARD_MODULE_PROPERTIES_EX
- };
- #ifdef COMPILE_DL_OPENSSL
- ZEND_GET_MODULE(openssl)
- #endif
- #if PHP_OPENSSL_API_VERSION < 0x10100
- #define EVP_PKEY_get0_RSA(_pkey) _pkey->pkey.rsa
- #define EVP_PKEY_get0_DH(_pkey) _pkey->pkey.dh
- #define EVP_PKEY_get0_DSA(_pkey) _pkey->pkey.dsa
- #define EVP_PKEY_get0_EC_KEY(_pkey) _pkey->pkey.ec
- static int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d)
- {
- r->n = n;
- r->e = e;
- r->d = d;
- return 1;
- }
- static int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q)
- {
- r->p = p;
- r->q = q;
- return 1;
- }
- static int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp)
- {
- r->dmp1 = dmp1;
- r->dmq1 = dmq1;
- r->iqmp = iqmp;
- return 1;
- }
- static void RSA_get0_key(const RSA *r, const BIGNUM **n, const BIGNUM **e, const BIGNUM **d)
- {
- *n = r->n;
- *e = r->e;
- *d = r->d;
- }
- static void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q)
- {
- *p = r->p;
- *q = r->q;
- }
- static void RSA_get0_crt_params(const RSA *r, const BIGNUM **dmp1, const BIGNUM **dmq1, const BIGNUM **iqmp)
- {
- *dmp1 = r->dmp1;
- *dmq1 = r->dmq1;
- *iqmp = r->iqmp;
- }
- static void DH_get0_pqg(const DH *dh, const BIGNUM **p, const BIGNUM **q, const BIGNUM **g)
- {
- *p = dh->p;
- *q = dh->q;
- *g = dh->g;
- }
- static int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g)
- {
- dh->p = p;
- dh->q = q;
- dh->g = g;
- return 1;
- }
- static void DH_get0_key(const DH *dh, const BIGNUM **pub_key, const BIGNUM **priv_key)
- {
- *pub_key = dh->pub_key;
- *priv_key = dh->priv_key;
- }
- static int DH_set0_key(DH *dh, BIGNUM *pub_key, BIGNUM *priv_key)
- {
- dh->pub_key = pub_key;
- dh->priv_key = priv_key;
- return 1;
- }
- static void DSA_get0_pqg(const DSA *d, const BIGNUM **p, const BIGNUM **q, const BIGNUM **g)
- {
- *p = d->p;
- *q = d->q;
- *g = d->g;
- }
- int DSA_set0_pqg(DSA *d, BIGNUM *p, BIGNUM *q, BIGNUM *g)
- {
- d->p = p;
- d->q = q;
- d->g = g;
- return 1;
- }
- static void DSA_get0_key(const DSA *d, const BIGNUM **pub_key, const BIGNUM **priv_key)
- {
- *pub_key = d->pub_key;
- *priv_key = d->priv_key;
- }
- int DSA_set0_key(DSA *d, BIGNUM *pub_key, BIGNUM *priv_key)
- {
- d->pub_key = pub_key;
- d->priv_key = priv_key;
- return 1;
- }
- static const unsigned char *ASN1_STRING_get0_data(const ASN1_STRING *asn1)
- {
- return M_ASN1_STRING_data(asn1);
- }
- #if PHP_OPENSSL_API_VERSION < 0x10002
- static int X509_get_signature_nid(const X509 *x)
- {
- return OBJ_obj2nid(x->sig_alg->algorithm);
- }
- #endif
- #endif
- #define PHP_OPENSSL_CHECK_NUMBER_CONVERSION(_cond, _name) \
- do { \
- if (_cond) { \
- php_error_docref(NULL, E_WARNING, #_name" is too long"); \
- RETURN_FALSE; \
- } \
- } while(0)
- #define PHP_OPENSSL_CHECK_SIZE_T_TO_INT(_var, _name) \
- PHP_OPENSSL_CHECK_NUMBER_CONVERSION(ZEND_SIZE_T_INT_OVFL(_var), _name)
- #define PHP_OPENSSL_CHECK_SIZE_T_TO_UINT(_var, _name) \
- PHP_OPENSSL_CHECK_NUMBER_CONVERSION(ZEND_SIZE_T_UINT_OVFL(_var), _name)
- #define PHP_OPENSSL_CHECK_LONG_TO_INT(_var, _name) \
- PHP_OPENSSL_CHECK_NUMBER_CONVERSION(ZEND_LONG_EXCEEDS_INT(_var), _name)
- void php_openssl_store_errors()
- {
- struct php_openssl_errors *errors;
- int error_code = ERR_get_error();
- if (!error_code) {
- return;
- }
- if (!OPENSSL_G(errors)) {
- OPENSSL_G(errors) = pecalloc(1, sizeof(struct php_openssl_errors), 1);
- }
- errors = OPENSSL_G(errors);
- do {
- errors->top = (errors->top + 1) % ERR_NUM_ERRORS;
- if (errors->top == errors->bottom) {
- errors->bottom = (errors->bottom + 1) % ERR_NUM_ERRORS;
- }
- errors->buffer[errors->top] = error_code;
- } while ((error_code = ERR_get_error()));
- }
- static int le_key;
- static int le_x509;
- static int le_csr;
- static int ssl_stream_data_index;
- int php_openssl_get_x509_list_id(void)
- {
- return le_x509;
- }
- static void php_openssl_pkey_free(zend_resource *rsrc)
- {
- EVP_PKEY *pkey = (EVP_PKEY *)rsrc->ptr;
- assert(pkey != NULL);
- EVP_PKEY_free(pkey);
- }
- static void php_openssl_x509_free(zend_resource *rsrc)
- {
- X509 *x509 = (X509 *)rsrc->ptr;
- X509_free(x509);
- }
- static void php_openssl_csr_free(zend_resource *rsrc)
- {
- X509_REQ * csr = (X509_REQ*)rsrc->ptr;
- X509_REQ_free(csr);
- }
- inline static int php_openssl_open_base_dir_chk(char *filename)
- {
- if (php_check_open_basedir(filename)) {
- return -1;
- }
- return 0;
- }
- php_stream* php_openssl_get_stream_from_ssl_handle(const SSL *ssl)
- {
- return (php_stream*)SSL_get_ex_data(ssl, ssl_stream_data_index);
- }
- int php_openssl_get_ssl_stream_data_index()
- {
- return ssl_stream_data_index;
- }
- static char default_ssl_conf_filename[MAXPATHLEN];
- struct php_x509_request {
- LHASH_OF(CONF_VALUE) * global_config;
- LHASH_OF(CONF_VALUE) * req_config;
- const EVP_MD * md_alg;
- const EVP_MD * digest;
- char * section_name,
- * config_filename,
- * digest_name,
- * extensions_section,
- * request_extensions_section;
- int priv_key_bits;
- int priv_key_type;
- int priv_key_encrypt;
- #ifdef HAVE_EVP_PKEY_EC
- int curve_name;
- #endif
- EVP_PKEY * priv_key;
- const EVP_CIPHER * priv_key_encrypt_cipher;
- };
- static X509 * php_openssl_x509_from_zval(zval * val, int makeresource, zend_resource **resourceval);
- static EVP_PKEY * php_openssl_evp_from_zval(
- zval * val, int public_key, char *passphrase, size_t passphrase_len,
- int makeresource, zend_resource **resourceval);
- static int php_openssl_is_private_key(EVP_PKEY* pkey);
- static X509_STORE * php_openssl_setup_verify(zval * calist);
- static STACK_OF(X509) * php_openssl_load_all_certs_from_file(char *certfile);
- static X509_REQ * php_openssl_csr_from_zval(zval * val, int makeresource, zend_resource ** resourceval);
- static EVP_PKEY * php_openssl_generate_private_key(struct php_x509_request * req);
- static void php_openssl_add_assoc_name_entry(zval * val, char * key, X509_NAME * name, int shortname)
- {
- zval *data;
- zval subitem, tmp;
- int i;
- char *sname;
- int nid;
- X509_NAME_ENTRY * ne;
- ASN1_STRING * str = NULL;
- ASN1_OBJECT * obj;
- if (key != NULL) {
- array_init(&subitem);
- } else {
- ZVAL_COPY_VALUE(&subitem, val);
- }
- for (i = 0; i < X509_NAME_entry_count(name); i++) {
- const unsigned char *to_add = NULL;
- int to_add_len = 0;
- unsigned char *to_add_buf = NULL;
- ne = X509_NAME_get_entry(name, i);
- obj = X509_NAME_ENTRY_get_object(ne);
- nid = OBJ_obj2nid(obj);
- if (shortname) {
- sname = (char *) OBJ_nid2sn(nid);
- } else {
- sname = (char *) OBJ_nid2ln(nid);
- }
- str = X509_NAME_ENTRY_get_data(ne);
- if (ASN1_STRING_type(str) != V_ASN1_UTF8STRING) {
-
- to_add_len = ASN1_STRING_to_UTF8(&to_add_buf, str);
- to_add = to_add_buf;
- } else {
-
- to_add = ASN1_STRING_get0_data(str);
- to_add_len = ASN1_STRING_length(str);
- }
- if (to_add_len != -1) {
- if ((data = zend_hash_str_find(Z_ARRVAL(subitem), sname, strlen(sname))) != NULL) {
- if (Z_TYPE_P(data) == IS_ARRAY) {
- add_next_index_stringl(data, (const char *)to_add, to_add_len);
- } else if (Z_TYPE_P(data) == IS_STRING) {
- array_init(&tmp);
- add_next_index_str(&tmp, zend_string_copy(Z_STR_P(data)));
- add_next_index_stringl(&tmp, (const char *)to_add, to_add_len);
- zend_hash_str_update(Z_ARRVAL(subitem), sname, strlen(sname), &tmp);
- }
- } else {
-
- add_assoc_stringl(&subitem, sname, (char *)to_add, to_add_len);
- }
- } else {
- php_openssl_store_errors();
- }
- if (to_add_buf != NULL) {
- OPENSSL_free(to_add_buf);
- }
- }
- if (key != NULL) {
- zend_hash_str_update(Z_ARRVAL_P(val), key, strlen(key), &subitem);
- }
- }
- static void php_openssl_add_assoc_asn1_string(zval * val, char * key, ASN1_STRING * str)
- {
- add_assoc_stringl(val, key, (char *)str->data, str->length);
- }
- static time_t php_openssl_asn1_time_to_time_t(ASN1_UTCTIME * timestr)
- {
- time_t ret;
- struct tm thetime;
- char * strbuf;
- char * thestr;
- long gmadjust = 0;
- size_t timestr_len;
- if (ASN1_STRING_type(timestr) != V_ASN1_UTCTIME && ASN1_STRING_type(timestr) != V_ASN1_GENERALIZEDTIME) {
- php_error_docref(NULL, E_WARNING, "illegal ASN1 data type for timestamp");
- return (time_t)-1;
- }
- timestr_len = (size_t)ASN1_STRING_length(timestr);
- if (timestr_len != strlen((const char *)ASN1_STRING_get0_data(timestr))) {
- php_error_docref(NULL, E_WARNING, "illegal length in timestamp");
- return (time_t)-1;
- }
- if (timestr_len < 13 && timestr_len != 11) {
- php_error_docref(NULL, E_WARNING, "unable to parse time string %s correctly", timestr->data);
- return (time_t)-1;
- }
- if (ASN1_STRING_type(timestr) == V_ASN1_GENERALIZEDTIME && timestr_len < 15) {
- php_error_docref(NULL, E_WARNING, "unable to parse time string %s correctly", timestr->data);
- return (time_t)-1;
- }
- strbuf = estrdup((const char *)ASN1_STRING_get0_data(timestr));
- memset(&thetime, 0, sizeof(thetime));
-
- thestr = strbuf + timestr_len - 3;
- if (timestr_len == 11) {
- thetime.tm_sec = 0;
- } else {
- thetime.tm_sec = atoi(thestr);
- *thestr = '\0';
- thestr -= 2;
- }
- thetime.tm_min = atoi(thestr);
- *thestr = '\0';
- thestr -= 2;
- thetime.tm_hour = atoi(thestr);
- *thestr = '\0';
- thestr -= 2;
- thetime.tm_mday = atoi(thestr);
- *thestr = '\0';
- thestr -= 2;
- thetime.tm_mon = atoi(thestr)-1;
- *thestr = '\0';
- if( ASN1_STRING_type(timestr) == V_ASN1_UTCTIME ) {
- thestr -= 2;
- thetime.tm_year = atoi(thestr);
- if (thetime.tm_year < 68) {
- thetime.tm_year += 100;
- }
- } else if( ASN1_STRING_type(timestr) == V_ASN1_GENERALIZEDTIME ) {
- thestr -= 4;
- thetime.tm_year = atoi(thestr) - 1900;
- }
- thetime.tm_isdst = -1;
- ret = mktime(&thetime);
- #if HAVE_TM_GMTOFF
- gmadjust = thetime.tm_gmtoff;
- #else
-
- gmadjust = -(thetime.tm_isdst ? (long)timezone - 3600 : (long)timezone);
- #endif
- ret += gmadjust;
- efree(strbuf);
- return ret;
- }
- static inline int php_openssl_config_check_syntax(const char * section_label, const char * config_filename, const char * section, LHASH_OF(CONF_VALUE) * config)
- {
- X509V3_CTX ctx;
- X509V3_set_ctx_test(&ctx);
- X509V3_set_conf_lhash(&ctx, config);
- if (!X509V3_EXT_add_conf(config, &ctx, (char *)section, NULL)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Error loading %s section %s of %s",
- section_label,
- section,
- config_filename);
- return FAILURE;
- }
- return SUCCESS;
- }
- static int php_openssl_add_oid_section(struct php_x509_request * req)
- {
- char * str;
- STACK_OF(CONF_VALUE) * sktmp;
- CONF_VALUE * cnf;
- int i;
- str = CONF_get_string(req->req_config, NULL, "oid_section");
- if (str == NULL) {
- php_openssl_store_errors();
- return SUCCESS;
- }
- sktmp = CONF_get_section(req->req_config, str);
- if (sktmp == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "problem loading oid section %s", str);
- return FAILURE;
- }
- for (i = 0; i < sk_CONF_VALUE_num(sktmp); i++) {
- cnf = sk_CONF_VALUE_value(sktmp, i);
- if (OBJ_sn2nid(cnf->name) == NID_undef && OBJ_ln2nid(cnf->name) == NID_undef &&
- OBJ_create(cnf->value, cnf->name, cnf->name) == NID_undef) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "problem creating object %s=%s", cnf->name, cnf->value);
- return FAILURE;
- }
- }
- return SUCCESS;
- }
- #define PHP_SSL_REQ_INIT(req) memset(req, 0, sizeof(*req))
- #define PHP_SSL_REQ_DISPOSE(req) php_openssl_dispose_config(req)
- #define PHP_SSL_REQ_PARSE(req, zval) php_openssl_parse_config(req, zval)
- #define PHP_SSL_CONFIG_SYNTAX_CHECK(var) if (req->var && php_openssl_config_check_syntax(#var, \
- req->config_filename, req->var, req->req_config) == FAILURE) return FAILURE
- #define SET_OPTIONAL_STRING_ARG(key, varname, defval) \
- do { \
- if (optional_args && (item = zend_hash_str_find(Z_ARRVAL_P(optional_args), key, sizeof(key)-1)) != NULL && Z_TYPE_P(item) == IS_STRING) { \
- varname = Z_STRVAL_P(item); \
- } else { \
- varname = defval; \
- if (varname == NULL) { \
- php_openssl_store_errors(); \
- } \
- } \
- } while(0)
- #define SET_OPTIONAL_LONG_ARG(key, varname, defval) \
- if (optional_args && (item = zend_hash_str_find(Z_ARRVAL_P(optional_args), key, sizeof(key)-1)) != NULL && Z_TYPE_P(item) == IS_LONG) \
- varname = (int)Z_LVAL_P(item); \
- else \
- varname = defval
- static const EVP_CIPHER * php_openssl_get_evp_cipher_from_algo(zend_long algo);
- static int php_openssl_spki_cleanup(const char *src, char *dest)
- {
- int removed = 0;
- while (*src) {
- if (*src != '\n' && *src != '\r') {
- *dest++ = *src;
- } else {
- ++removed;
- }
- ++src;
- }
- *dest = 0;
- return removed;
- }
- static int php_openssl_parse_config(struct php_x509_request * req, zval * optional_args)
- {
- char * str;
- zval * item;
- SET_OPTIONAL_STRING_ARG("config", req->config_filename, default_ssl_conf_filename);
- SET_OPTIONAL_STRING_ARG("config_section_name", req->section_name, "req");
- req->global_config = CONF_load(NULL, default_ssl_conf_filename, NULL);
- if (req->global_config == NULL) {
- php_openssl_store_errors();
- }
- req->req_config = CONF_load(NULL, req->config_filename, NULL);
- if (req->req_config == NULL) {
- php_openssl_store_errors();
- return FAILURE;
- }
-
- str = CONF_get_string(req->req_config, NULL, "oid_file");
- if (str == NULL) {
- php_openssl_store_errors();
- } else if (!php_openssl_open_base_dir_chk(str)) {
- BIO *oid_bio = BIO_new_file(str, PHP_OPENSSL_BIO_MODE_R(PKCS7_BINARY));
- if (oid_bio) {
- OBJ_create_objects(oid_bio);
- BIO_free(oid_bio);
- php_openssl_store_errors();
- }
- }
- if (php_openssl_add_oid_section(req) == FAILURE) {
- return FAILURE;
- }
- SET_OPTIONAL_STRING_ARG("digest_alg", req->digest_name,
- CONF_get_string(req->req_config, req->section_name, "default_md"));
- SET_OPTIONAL_STRING_ARG("x509_extensions", req->extensions_section,
- CONF_get_string(req->req_config, req->section_name, "x509_extensions"));
- SET_OPTIONAL_STRING_ARG("req_extensions", req->request_extensions_section,
- CONF_get_string(req->req_config, req->section_name, "req_extensions"));
- SET_OPTIONAL_LONG_ARG("private_key_bits", req->priv_key_bits,
- CONF_get_number(req->req_config, req->section_name, "default_bits"));
- SET_OPTIONAL_LONG_ARG("private_key_type", req->priv_key_type, OPENSSL_KEYTYPE_DEFAULT);
- if (optional_args && (item = zend_hash_str_find(Z_ARRVAL_P(optional_args), "encrypt_key", sizeof("encrypt_key")-1)) != NULL) {
- req->priv_key_encrypt = Z_TYPE_P(item) == IS_TRUE ? 1 : 0;
- } else {
- str = CONF_get_string(req->req_config, req->section_name, "encrypt_rsa_key");
- if (str == NULL) {
- str = CONF_get_string(req->req_config, req->section_name, "encrypt_key");
-
- php_openssl_store_errors();
- }
- if (str != NULL && strcmp(str, "no") == 0) {
- req->priv_key_encrypt = 0;
- } else {
- req->priv_key_encrypt = 1;
- }
- }
- if (req->priv_key_encrypt &&
- optional_args &&
- (item = zend_hash_str_find(Z_ARRVAL_P(optional_args), "encrypt_key_cipher", sizeof("encrypt_key_cipher")-1)) != NULL &&
- Z_TYPE_P(item) == IS_LONG
- ) {
- zend_long cipher_algo = Z_LVAL_P(item);
- const EVP_CIPHER* cipher = php_openssl_get_evp_cipher_from_algo(cipher_algo);
- if (cipher == NULL) {
- php_error_docref(NULL, E_WARNING, "Unknown cipher algorithm for private key.");
- return FAILURE;
- } else {
- req->priv_key_encrypt_cipher = cipher;
- }
- } else {
- req->priv_key_encrypt_cipher = NULL;
- }
-
- if (req->digest_name == NULL) {
- req->digest_name = CONF_get_string(req->req_config, req->section_name, "default_md");
- }
- if (req->digest_name != NULL) {
- req->digest = req->md_alg = EVP_get_digestbyname(req->digest_name);
- } else {
- php_openssl_store_errors();
- }
- if (req->md_alg == NULL) {
- req->md_alg = req->digest = EVP_sha1();
- php_openssl_store_errors();
- }
- PHP_SSL_CONFIG_SYNTAX_CHECK(extensions_section);
- #ifdef HAVE_EVP_PKEY_EC
-
- req->curve_name = NID_undef;
- if (optional_args && (item = zend_hash_str_find(Z_ARRVAL_P(optional_args), "curve_name", sizeof("curve_name")-1)) != NULL
- && Z_TYPE_P(item) == IS_STRING) {
- req->curve_name = OBJ_sn2nid(Z_STRVAL_P(item));
- if (req->curve_name == NID_undef) {
- php_error_docref(NULL, E_WARNING, "Unknown elliptic curve (short) name %s", Z_STRVAL_P(item));
- return FAILURE;
- }
- }
- #endif
-
- str = CONF_get_string(req->req_config, req->section_name, "string_mask");
- if (str == NULL) {
- php_openssl_store_errors();
- } else if (!ASN1_STRING_set_default_mask_asc(str)) {
- php_error_docref(NULL, E_WARNING, "Invalid global string mask setting %s", str);
- return FAILURE;
- }
- PHP_SSL_CONFIG_SYNTAX_CHECK(request_extensions_section);
- return SUCCESS;
- }
- static void php_openssl_dispose_config(struct php_x509_request * req)
- {
- if (req->priv_key) {
- EVP_PKEY_free(req->priv_key);
- req->priv_key = NULL;
- }
- if (req->global_config) {
- CONF_free(req->global_config);
- req->global_config = NULL;
- }
- if (req->req_config) {
- CONF_free(req->req_config);
- req->req_config = NULL;
- }
- }
- #if defined(PHP_WIN32) || PHP_OPENSSL_API_VERSION >= 0x10100
- #define PHP_OPENSSL_RAND_ADD_TIME() ((void) 0)
- #else
- #define PHP_OPENSSL_RAND_ADD_TIME() php_openssl_rand_add_timeval()
- static inline void php_openssl_rand_add_timeval()
- {
- struct timeval tv;
- gettimeofday(&tv, NULL);
- RAND_add(&tv, sizeof(tv), 0.0);
- }
- #endif
- static int php_openssl_load_rand_file(const char * file, int *egdsocket, int *seeded)
- {
- char buffer[MAXPATHLEN];
- *egdsocket = 0;
- *seeded = 0;
- if (file == NULL) {
- file = RAND_file_name(buffer, sizeof(buffer));
- #ifdef HAVE_RAND_EGD
- } else if (RAND_egd(file) > 0) {
-
- *egdsocket = 1;
- return SUCCESS;
- #endif
- }
- if (file == NULL || !RAND_load_file(file, -1)) {
- if (RAND_status() == 0) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "unable to load random state; not enough random data!");
- return FAILURE;
- }
- return FAILURE;
- }
- *seeded = 1;
- return SUCCESS;
- }
- static int php_openssl_write_rand_file(const char * file, int egdsocket, int seeded)
- {
- char buffer[MAXPATHLEN];
- if (egdsocket || !seeded) {
-
- return FAILURE;
- }
- if (file == NULL) {
- file = RAND_file_name(buffer, sizeof(buffer));
- }
- PHP_OPENSSL_RAND_ADD_TIME();
- if (file == NULL || !RAND_write_file(file)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "unable to write random state");
- return FAILURE;
- }
- return SUCCESS;
- }
- static EVP_MD * php_openssl_get_evp_md_from_algo(zend_long algo) {
- EVP_MD *mdtype;
- switch (algo) {
- case OPENSSL_ALGO_SHA1:
- mdtype = (EVP_MD *) EVP_sha1();
- break;
- case OPENSSL_ALGO_MD5:
- mdtype = (EVP_MD *) EVP_md5();
- break;
- case OPENSSL_ALGO_MD4:
- mdtype = (EVP_MD *) EVP_md4();
- break;
- #ifdef HAVE_OPENSSL_MD2_H
- case OPENSSL_ALGO_MD2:
- mdtype = (EVP_MD *) EVP_md2();
- break;
- #endif
- #if PHP_OPENSSL_API_VERSION < 0x10100
- case OPENSSL_ALGO_DSS1:
- mdtype = (EVP_MD *) EVP_dss1();
- break;
- #endif
- case OPENSSL_ALGO_SHA224:
- mdtype = (EVP_MD *) EVP_sha224();
- break;
- case OPENSSL_ALGO_SHA256:
- mdtype = (EVP_MD *) EVP_sha256();
- break;
- case OPENSSL_ALGO_SHA384:
- mdtype = (EVP_MD *) EVP_sha384();
- break;
- case OPENSSL_ALGO_SHA512:
- mdtype = (EVP_MD *) EVP_sha512();
- break;
- case OPENSSL_ALGO_RMD160:
- mdtype = (EVP_MD *) EVP_ripemd160();
- break;
- default:
- return NULL;
- break;
- }
- return mdtype;
- }
- static const EVP_CIPHER * php_openssl_get_evp_cipher_from_algo(zend_long algo) {
- switch (algo) {
- #ifndef OPENSSL_NO_RC2
- case PHP_OPENSSL_CIPHER_RC2_40:
- return EVP_rc2_40_cbc();
- break;
- case PHP_OPENSSL_CIPHER_RC2_64:
- return EVP_rc2_64_cbc();
- break;
- case PHP_OPENSSL_CIPHER_RC2_128:
- return EVP_rc2_cbc();
- break;
- #endif
- #ifndef OPENSSL_NO_DES
- case PHP_OPENSSL_CIPHER_DES:
- return EVP_des_cbc();
- break;
- case PHP_OPENSSL_CIPHER_3DES:
- return EVP_des_ede3_cbc();
- break;
- #endif
- #ifndef OPENSSL_NO_AES
- case PHP_OPENSSL_CIPHER_AES_128_CBC:
- return EVP_aes_128_cbc();
- break;
- case PHP_OPENSSL_CIPHER_AES_192_CBC:
- return EVP_aes_192_cbc();
- break;
- case PHP_OPENSSL_CIPHER_AES_256_CBC:
- return EVP_aes_256_cbc();
- break;
- #endif
- default:
- return NULL;
- break;
- }
- }
- PHP_INI_BEGIN()
- PHP_INI_ENTRY("openssl.cafile", NULL, PHP_INI_PERDIR, NULL)
- PHP_INI_ENTRY("openssl.capath", NULL, PHP_INI_PERDIR, NULL)
- PHP_INI_END()
- PHP_MINIT_FUNCTION(openssl)
- {
- char * config_filename;
- le_key = zend_register_list_destructors_ex(php_openssl_pkey_free, NULL, "OpenSSL key", module_number);
- le_x509 = zend_register_list_destructors_ex(php_openssl_x509_free, NULL, "OpenSSL X.509", module_number);
- le_csr = zend_register_list_destructors_ex(php_openssl_csr_free, NULL, "OpenSSL X.509 CSR", module_number);
- #if OPENSSL_VERSION_NUMBER < 0x10100000L || defined (LIBRESSL_VERSION_NUMBER)
- OPENSSL_config(NULL);
- SSL_library_init();
- OpenSSL_add_all_ciphers();
- OpenSSL_add_all_digests();
- OpenSSL_add_all_algorithms();
- #if !defined(OPENSSL_NO_AES) && defined(EVP_CIPH_CCM_MODE) && OPENSSL_VERSION_NUMBER < 0x100020000
- EVP_add_cipher(EVP_aes_128_ccm());
- EVP_add_cipher(EVP_aes_192_ccm());
- EVP_add_cipher(EVP_aes_256_ccm());
- #endif
- SSL_load_error_strings();
- #else
- OPENSSL_init_ssl(OPENSSL_INIT_LOAD_CONFIG, NULL);
- #endif
-
- ssl_stream_data_index = SSL_get_ex_new_index(0, "PHP stream index", NULL, NULL, NULL);
- REGISTER_STRING_CONSTANT("OPENSSL_VERSION_TEXT", OPENSSL_VERSION_TEXT, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_VERSION_NUMBER", OPENSSL_VERSION_NUMBER, CONST_CS|CONST_PERSISTENT);
-
- REGISTER_LONG_CONSTANT("X509_PURPOSE_SSL_CLIENT", X509_PURPOSE_SSL_CLIENT, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("X509_PURPOSE_SSL_SERVER", X509_PURPOSE_SSL_SERVER, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("X509_PURPOSE_NS_SSL_SERVER", X509_PURPOSE_NS_SSL_SERVER, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("X509_PURPOSE_SMIME_SIGN", X509_PURPOSE_SMIME_SIGN, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("X509_PURPOSE_SMIME_ENCRYPT", X509_PURPOSE_SMIME_ENCRYPT, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("X509_PURPOSE_CRL_SIGN", X509_PURPOSE_CRL_SIGN, CONST_CS|CONST_PERSISTENT);
- #ifdef X509_PURPOSE_ANY
- REGISTER_LONG_CONSTANT("X509_PURPOSE_ANY", X509_PURPOSE_ANY, CONST_CS|CONST_PERSISTENT);
- #endif
-
- REGISTER_LONG_CONSTANT("OPENSSL_ALGO_SHA1", OPENSSL_ALGO_SHA1, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_ALGO_MD5", OPENSSL_ALGO_MD5, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_ALGO_MD4", OPENSSL_ALGO_MD4, CONST_CS|CONST_PERSISTENT);
- #ifdef HAVE_OPENSSL_MD2_H
- REGISTER_LONG_CONSTANT("OPENSSL_ALGO_MD2", OPENSSL_ALGO_MD2, CONST_CS|CONST_PERSISTENT);
- #endif
- #if PHP_OPENSSL_API_VERSION < 0x10100
- REGISTER_LONG_CONSTANT("OPENSSL_ALGO_DSS1", OPENSSL_ALGO_DSS1, CONST_CS|CONST_PERSISTENT);
- #endif
- REGISTER_LONG_CONSTANT("OPENSSL_ALGO_SHA224", OPENSSL_ALGO_SHA224, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_ALGO_SHA256", OPENSSL_ALGO_SHA256, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_ALGO_SHA384", OPENSSL_ALGO_SHA384, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_ALGO_SHA512", OPENSSL_ALGO_SHA512, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_ALGO_RMD160", OPENSSL_ALGO_RMD160, CONST_CS|CONST_PERSISTENT);
-
- REGISTER_LONG_CONSTANT("PKCS7_DETACHED", PKCS7_DETACHED, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("PKCS7_TEXT", PKCS7_TEXT, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("PKCS7_NOINTERN", PKCS7_NOINTERN, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("PKCS7_NOVERIFY", PKCS7_NOVERIFY, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("PKCS7_NOCHAIN", PKCS7_NOCHAIN, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("PKCS7_NOCERTS", PKCS7_NOCERTS, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("PKCS7_NOATTR", PKCS7_NOATTR, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("PKCS7_BINARY", PKCS7_BINARY, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("PKCS7_NOSIGS", PKCS7_NOSIGS, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_PKCS1_PADDING", RSA_PKCS1_PADDING, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_SSLV23_PADDING", RSA_SSLV23_PADDING, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_NO_PADDING", RSA_NO_PADDING, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_PKCS1_OAEP_PADDING", RSA_PKCS1_OAEP_PADDING, CONST_CS|CONST_PERSISTENT);
-
- REGISTER_STRING_CONSTANT("OPENSSL_DEFAULT_STREAM_CIPHERS", OPENSSL_DEFAULT_STREAM_CIPHERS, CONST_CS|CONST_PERSISTENT);
-
- #ifndef OPENSSL_NO_RC2
- REGISTER_LONG_CONSTANT("OPENSSL_CIPHER_RC2_40", PHP_OPENSSL_CIPHER_RC2_40, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_CIPHER_RC2_128", PHP_OPENSSL_CIPHER_RC2_128, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_CIPHER_RC2_64", PHP_OPENSSL_CIPHER_RC2_64, CONST_CS|CONST_PERSISTENT);
- #endif
- #ifndef OPENSSL_NO_DES
- REGISTER_LONG_CONSTANT("OPENSSL_CIPHER_DES", PHP_OPENSSL_CIPHER_DES, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_CIPHER_3DES", PHP_OPENSSL_CIPHER_3DES, CONST_CS|CONST_PERSISTENT);
- #endif
- #ifndef OPENSSL_NO_AES
- REGISTER_LONG_CONSTANT("OPENSSL_CIPHER_AES_128_CBC", PHP_OPENSSL_CIPHER_AES_128_CBC, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_CIPHER_AES_192_CBC", PHP_OPENSSL_CIPHER_AES_192_CBC, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_CIPHER_AES_256_CBC", PHP_OPENSSL_CIPHER_AES_256_CBC, CONST_CS|CONST_PERSISTENT);
- #endif
-
- REGISTER_LONG_CONSTANT("OPENSSL_KEYTYPE_RSA", OPENSSL_KEYTYPE_RSA, CONST_CS|CONST_PERSISTENT);
- #ifndef NO_DSA
- REGISTER_LONG_CONSTANT("OPENSSL_KEYTYPE_DSA", OPENSSL_KEYTYPE_DSA, CONST_CS|CONST_PERSISTENT);
- #endif
- REGISTER_LONG_CONSTANT("OPENSSL_KEYTYPE_DH", OPENSSL_KEYTYPE_DH, CONST_CS|CONST_PERSISTENT);
- #ifdef HAVE_EVP_PKEY_EC
- REGISTER_LONG_CONSTANT("OPENSSL_KEYTYPE_EC", OPENSSL_KEYTYPE_EC, CONST_CS|CONST_PERSISTENT);
- #endif
- REGISTER_LONG_CONSTANT("OPENSSL_RAW_DATA", OPENSSL_RAW_DATA, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_ZERO_PADDING", OPENSSL_ZERO_PADDING, CONST_CS|CONST_PERSISTENT);
- REGISTER_LONG_CONSTANT("OPENSSL_DONT_ZERO_PAD_KEY", OPENSSL_DONT_ZERO_PAD_KEY, CONST_CS|CONST_PERSISTENT);
- #ifndef OPENSSL_NO_TLSEXT
-
- REGISTER_LONG_CONSTANT("OPENSSL_TLSEXT_SERVER_NAME", 1, CONST_CS|CONST_PERSISTENT);
- #endif
-
- config_filename = getenv("OPENSSL_CONF");
- if (config_filename == NULL) {
- config_filename = getenv("SSLEAY_CONF");
- }
-
- if (config_filename == NULL) {
- snprintf(default_ssl_conf_filename, sizeof(default_ssl_conf_filename), "%s/%s",
- X509_get_default_cert_area(),
- "openssl.cnf");
- } else {
- strlcpy(default_ssl_conf_filename, config_filename, sizeof(default_ssl_conf_filename));
- }
- php_stream_xport_register("ssl", php_openssl_ssl_socket_factory);
- #ifndef OPENSSL_NO_SSL3
- php_stream_xport_register("sslv3", php_openssl_ssl_socket_factory);
- #endif
- php_stream_xport_register("tls", php_openssl_ssl_socket_factory);
- php_stream_xport_register("tlsv1.0", php_openssl_ssl_socket_factory);
- php_stream_xport_register("tlsv1.1", php_openssl_ssl_socket_factory);
- php_stream_xport_register("tlsv1.2", php_openssl_ssl_socket_factory);
-
- php_stream_xport_register("tcp", php_openssl_ssl_socket_factory);
- php_register_url_stream_wrapper("https", &php_stream_http_wrapper);
- php_register_url_stream_wrapper("ftps", &php_stream_ftp_wrapper);
- REGISTER_INI_ENTRIES();
- return SUCCESS;
- }
- PHP_GINIT_FUNCTION(openssl)
- {
- #if defined(COMPILE_DL_OPENSSL) && defined(ZTS)
- ZEND_TSRMLS_CACHE_UPDATE();
- #endif
- openssl_globals->errors = NULL;
- }
- PHP_GSHUTDOWN_FUNCTION(openssl)
- {
- if (openssl_globals->errors) {
- pefree(openssl_globals->errors, 1);
- }
- }
- PHP_MINFO_FUNCTION(openssl)
- {
- php_info_print_table_start();
- php_info_print_table_row(2, "OpenSSL support", "enabled");
- php_info_print_table_row(2, "OpenSSL Library Version", SSLeay_version(SSLEAY_VERSION));
- php_info_print_table_row(2, "OpenSSL Header Version", OPENSSL_VERSION_TEXT);
- php_info_print_table_row(2, "Openssl default config", default_ssl_conf_filename);
- php_info_print_table_end();
- DISPLAY_INI_ENTRIES();
- }
- PHP_MSHUTDOWN_FUNCTION(openssl)
- {
- #if OPENSSL_VERSION_NUMBER < 0x10100000L || defined (LIBRESSL_VERSION_NUMBER)
- EVP_cleanup();
-
- CRYPTO_set_locking_callback(NULL);
-
- ERR_free_strings();
- CONF_modules_free();
- #endif
- php_unregister_url_stream_wrapper("https");
- php_unregister_url_stream_wrapper("ftps");
- php_stream_xport_unregister("ssl");
- #ifndef OPENSSL_NO_SSL3
- php_stream_xport_unregister("sslv3");
- #endif
- php_stream_xport_unregister("tls");
- php_stream_xport_unregister("tlsv1.0");
- php_stream_xport_unregister("tlsv1.1");
- php_stream_xport_unregister("tlsv1.2");
-
- php_stream_xport_register("tcp", php_stream_generic_socket_factory);
- UNREGISTER_INI_ENTRIES();
- return SUCCESS;
- }
- PHP_FUNCTION(openssl_get_cert_locations)
- {
- array_init(return_value);
- add_assoc_string(return_value, "default_cert_file", (char *) X509_get_default_cert_file());
- add_assoc_string(return_value, "default_cert_file_env", (char *) X509_get_default_cert_file_env());
- add_assoc_string(return_value, "default_cert_dir", (char *) X509_get_default_cert_dir());
- add_assoc_string(return_value, "default_cert_dir_env", (char *) X509_get_default_cert_dir_env());
- add_assoc_string(return_value, "default_private_dir", (char *) X509_get_default_private_dir());
- add_assoc_string(return_value, "default_default_cert_area", (char *) X509_get_default_cert_area());
- add_assoc_string(return_value, "ini_cafile",
- zend_ini_string("openssl.cafile", sizeof("openssl.cafile")-1, 0));
- add_assoc_string(return_value, "ini_capath",
- zend_ini_string("openssl.capath", sizeof("openssl.capath")-1, 0));
- }
- static X509 * php_openssl_x509_from_zval(zval * val, int makeresource, zend_resource **resourceval)
- {
- X509 *cert = NULL;
- BIO *in;
- if (resourceval) {
- *resourceval = NULL;
- }
- if (Z_TYPE_P(val) == IS_RESOURCE) {
-
- void * what;
- zend_resource *res = Z_RES_P(val);
- what = zend_fetch_resource(res, "OpenSSL X.509", le_x509);
- if (!what) {
- return NULL;
- }
- if (resourceval) {
- *resourceval = res;
- if (makeresource) {
- Z_ADDREF_P(val);
- }
- }
- return (X509*)what;
- }
- if (!(Z_TYPE_P(val) == IS_STRING || Z_TYPE_P(val) == IS_OBJECT)) {
- return NULL;
- }
-
- convert_to_string_ex(val);
- if (Z_STRLEN_P(val) > 7 && memcmp(Z_STRVAL_P(val), "file://", sizeof("file://") - 1) == 0) {
- if (php_openssl_open_base_dir_chk(Z_STRVAL_P(val) + (sizeof("file://") - 1))) {
- return NULL;
- }
- in = BIO_new_file(Z_STRVAL_P(val) + (sizeof("file://") - 1), PHP_OPENSSL_BIO_MODE_R(PKCS7_BINARY));
- if (in == NULL) {
- php_openssl_store_errors();
- return NULL;
- }
- cert = PEM_read_bio_X509(in, NULL, NULL, NULL);
- } else {
- in = BIO_new_mem_buf(Z_STRVAL_P(val), (int)Z_STRLEN_P(val));
- if (in == NULL) {
- php_openssl_store_errors();
- return NULL;
- }
- #ifdef TYPEDEF_D2I_OF
- cert = (X509 *) PEM_ASN1_read_bio((d2i_of_void *)d2i_X509, PEM_STRING_X509, in, NULL, NULL, NULL);
- #else
- cert = (X509 *) PEM_ASN1_read_bio((char *(*)())d2i_X509, PEM_STRING_X509, in, NULL, NULL, NULL);
- #endif
- }
- if (!BIO_free(in)) {
- php_openssl_store_errors();
- }
- if (cert == NULL) {
- php_openssl_store_errors();
- return NULL;
- }
- if (makeresource && resourceval) {
- *resourceval = zend_register_resource(cert, le_x509);
- }
- return cert;
- }
- PHP_FUNCTION(openssl_x509_export_to_file)
- {
- X509 * cert;
- zval * zcert;
- zend_bool notext = 1;
- BIO * bio_out;
- char * filename;
- size_t filename_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "zp|b", &zcert, &filename, &filename_len, ¬ext) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- cert = php_openssl_x509_from_zval(zcert, 0, NULL);
- if (cert == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get cert from parameter 1");
- return;
- }
- if (php_openssl_open_base_dir_chk(filename)) {
- return;
- }
- bio_out = BIO_new_file(filename, PHP_OPENSSL_BIO_MODE_W(PKCS7_BINARY));
- if (bio_out) {
- if (!notext && !X509_print(bio_out, cert)) {
- php_openssl_store_errors();
- }
- if (!PEM_write_bio_X509(bio_out, cert)) {
- php_openssl_store_errors();
- }
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "error opening file %s", filename);
- }
- if (Z_TYPE_P(zcert) != IS_RESOURCE) {
- X509_free(cert);
- }
- if (!BIO_free(bio_out)) {
- php_openssl_store_errors();
- }
- }
- PHP_FUNCTION(openssl_spki_new)
- {
- size_t challenge_len;
- char * challenge = NULL, * spkstr = NULL;
- zend_string * s = NULL;
- zend_resource *keyresource = NULL;
- const char *spkac = "SPKAC=";
- zend_long algo = OPENSSL_ALGO_MD5;
- zval *method = NULL;
- zval * zpkey = NULL;
- EVP_PKEY * pkey = NULL;
- NETSCAPE_SPKI *spki=NULL;
- const EVP_MD *mdtype;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "rs|z", &zpkey, &challenge, &challenge_len, &method) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(challenge_len, challenge);
- pkey = php_openssl_evp_from_zval(zpkey, 0, challenge, challenge_len, 1, &keyresource);
- if (pkey == NULL) {
- php_error_docref(NULL, E_WARNING, "Unable to use supplied private key");
- goto cleanup;
- }
- if (method != NULL) {
- if (Z_TYPE_P(method) == IS_LONG) {
- algo = Z_LVAL_P(method);
- } else {
- php_error_docref(NULL, E_WARNING, "Algorithm must be of supported type");
- goto cleanup;
- }
- }
- mdtype = php_openssl_get_evp_md_from_algo(algo);
- if (!mdtype) {
- php_error_docref(NULL, E_WARNING, "Unknown signature algorithm");
- goto cleanup;
- }
- if ((spki = NETSCAPE_SPKI_new()) == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Unable to create new SPKAC");
- goto cleanup;
- }
- if (challenge) {
- if (!ASN1_STRING_set(spki->spkac->challenge, challenge, (int)challenge_len)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Unable to set challenge data");
- goto cleanup;
- }
- }
- if (!NETSCAPE_SPKI_set_pubkey(spki, pkey)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Unable to embed public key");
- goto cleanup;
- }
- if (!NETSCAPE_SPKI_sign(spki, pkey, mdtype)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Unable to sign with specified algorithm");
- goto cleanup;
- }
- spkstr = NETSCAPE_SPKI_b64_encode(spki);
- if (!spkstr){
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Unable to encode SPKAC");
- goto cleanup;
- }
- s = zend_string_alloc(strlen(spkac) + strlen(spkstr), 0);
- sprintf(ZSTR_VAL(s), "%s%s", spkac, spkstr);
- ZSTR_LEN(s) = strlen(ZSTR_VAL(s));
- OPENSSL_free(spkstr);
- RETVAL_STR(s);
- goto cleanup;
- cleanup:
- if (spki != NULL) {
- NETSCAPE_SPKI_free(spki);
- }
- if (keyresource == NULL && pkey != NULL) {
- EVP_PKEY_free(pkey);
- }
- if (s && ZSTR_LEN(s) <= 0) {
- RETVAL_FALSE;
- }
- if (keyresource == NULL && s != NULL) {
- zend_string_release_ex(s, 0);
- }
- }
- PHP_FUNCTION(openssl_spki_verify)
- {
- size_t spkstr_len;
- int i = 0, spkstr_cleaned_len = 0;
- char *spkstr = NULL, * spkstr_cleaned = NULL;
- EVP_PKEY *pkey = NULL;
- NETSCAPE_SPKI *spki = NULL;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s", &spkstr, &spkstr_len) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- if (spkstr == NULL) {
- php_error_docref(NULL, E_WARNING, "Unable to use supplied SPKAC");
- goto cleanup;
- }
- spkstr_cleaned = emalloc(spkstr_len + 1);
- spkstr_cleaned_len = (int)(spkstr_len - php_openssl_spki_cleanup(spkstr, spkstr_cleaned));
- if (spkstr_cleaned_len == 0) {
- php_error_docref(NULL, E_WARNING, "Invalid SPKAC");
- goto cleanup;
- }
- spki = NETSCAPE_SPKI_b64_decode(spkstr_cleaned, spkstr_cleaned_len);
- if (spki == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Unable to decode supplied SPKAC");
- goto cleanup;
- }
- pkey = X509_PUBKEY_get(spki->spkac->pubkey);
- if (pkey == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Unable to acquire signed public key");
- goto cleanup;
- }
- i = NETSCAPE_SPKI_verify(spki, pkey);
- goto cleanup;
- cleanup:
- if (spki != NULL) {
- NETSCAPE_SPKI_free(spki);
- }
- if (pkey != NULL) {
- EVP_PKEY_free(pkey);
- }
- if (spkstr_cleaned != NULL) {
- efree(spkstr_cleaned);
- }
- if (i > 0) {
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- }
- }
- PHP_FUNCTION(openssl_spki_export)
- {
- size_t spkstr_len;
- char *spkstr = NULL, * spkstr_cleaned = NULL, * s = NULL;
- int spkstr_cleaned_len;
- EVP_PKEY *pkey = NULL;
- NETSCAPE_SPKI *spki = NULL;
- BIO *out = NULL;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s", &spkstr, &spkstr_len) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- if (spkstr == NULL) {
- php_error_docref(NULL, E_WARNING, "Unable to use supplied SPKAC");
- goto cleanup;
- }
- spkstr_cleaned = emalloc(spkstr_len + 1);
- spkstr_cleaned_len = (int)(spkstr_len - php_openssl_spki_cleanup(spkstr, spkstr_cleaned));
- if (spkstr_cleaned_len == 0) {
- php_error_docref(NULL, E_WARNING, "Invalid SPKAC");
- goto cleanup;
- }
- spki = NETSCAPE_SPKI_b64_decode(spkstr_cleaned, spkstr_cleaned_len);
- if (spki == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Unable to decode supplied SPKAC");
- goto cleanup;
- }
- pkey = X509_PUBKEY_get(spki->spkac->pubkey);
- if (pkey == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Unable to acquire signed public key");
- goto cleanup;
- }
- out = BIO_new(BIO_s_mem());
- if (out && PEM_write_bio_PUBKEY(out, pkey)) {
- BUF_MEM *bio_buf;
- BIO_get_mem_ptr(out, &bio_buf);
- RETVAL_STRINGL((char *)bio_buf->data, bio_buf->length);
- } else {
- php_openssl_store_errors();
- }
- goto cleanup;
- cleanup:
- if (spki != NULL) {
- NETSCAPE_SPKI_free(spki);
- }
- if (out != NULL) {
- BIO_free_all(out);
- }
- if (pkey != NULL) {
- EVP_PKEY_free(pkey);
- }
- if (spkstr_cleaned != NULL) {
- efree(spkstr_cleaned);
- }
- if (s != NULL) {
- efree(s);
- }
- }
- PHP_FUNCTION(openssl_spki_export_challenge)
- {
- size_t spkstr_len;
- char *spkstr = NULL, * spkstr_cleaned = NULL;
- int spkstr_cleaned_len;
- NETSCAPE_SPKI *spki = NULL;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s", &spkstr, &spkstr_len) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- if (spkstr == NULL) {
- php_error_docref(NULL, E_WARNING, "Unable to use supplied SPKAC");
- goto cleanup;
- }
- spkstr_cleaned = emalloc(spkstr_len + 1);
- spkstr_cleaned_len = (int)(spkstr_len - php_openssl_spki_cleanup(spkstr, spkstr_cleaned));
- if (spkstr_cleaned_len == 0) {
- php_error_docref(NULL, E_WARNING, "Invalid SPKAC");
- goto cleanup;
- }
- spki = NETSCAPE_SPKI_b64_decode(spkstr_cleaned, spkstr_cleaned_len);
- if (spki == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Unable to decode SPKAC");
- goto cleanup;
- }
- RETVAL_STRING((const char *)ASN1_STRING_get0_data(spki->spkac->challenge));
- goto cleanup;
- cleanup:
- if (spkstr_cleaned != NULL) {
- efree(spkstr_cleaned);
- }
- if (spki) {
- NETSCAPE_SPKI_free(spki);
- }
- }
- PHP_FUNCTION(openssl_x509_export)
- {
- X509 * cert;
- zval * zcert, *zout;
- zend_bool notext = 1;
- BIO * bio_out;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "zz/|b", &zcert, &zout, ¬ext) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- cert = php_openssl_x509_from_zval(zcert, 0, NULL);
- if (cert == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get cert from parameter 1");
- return;
- }
- bio_out = BIO_new(BIO_s_mem());
- if (!bio_out) {
- php_openssl_store_errors();
- goto cleanup;
- }
- if (!notext && !X509_print(bio_out, cert)) {
- php_openssl_store_errors();
- }
- if (PEM_write_bio_X509(bio_out, cert)) {
- BUF_MEM *bio_buf;
- zval_ptr_dtor(zout);
- BIO_get_mem_ptr(bio_out, &bio_buf);
- ZVAL_STRINGL(zout, bio_buf->data, bio_buf->length);
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- }
- BIO_free(bio_out);
- cleanup:
- if (Z_TYPE_P(zcert) != IS_RESOURCE) {
- X509_free(cert);
- }
- }
- zend_string* php_openssl_x509_fingerprint(X509 *peer, const char *method, zend_bool raw)
- {
- unsigned char md[EVP_MAX_MD_SIZE];
- const EVP_MD *mdtype;
- unsigned int n;
- zend_string *ret;
- if (!(mdtype = EVP_get_digestbyname(method))) {
- php_error_docref(NULL, E_WARNING, "Unknown signature algorithm");
- return NULL;
- } else if (!X509_digest(peer, mdtype, md, &n)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_ERROR, "Could not generate signature");
- return NULL;
- }
- if (raw) {
- ret = zend_string_init((char*)md, n, 0);
- } else {
- ret = zend_string_alloc(n * 2, 0);
- make_digest_ex(ZSTR_VAL(ret), md, n);
- ZSTR_VAL(ret)[n * 2] = '\0';
- }
- return ret;
- }
- PHP_FUNCTION(openssl_x509_fingerprint)
- {
- X509 *cert;
- zval *zcert;
- zend_bool raw_output = 0;
- char *method = "sha1";
- size_t method_len;
- zend_string *fingerprint;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "z|sb", &zcert, &method, &method_len, &raw_output) == FAILURE) {
- return;
- }
- cert = php_openssl_x509_from_zval(zcert, 0, NULL);
- if (cert == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get cert from parameter 1");
- RETURN_FALSE;
- }
- fingerprint = php_openssl_x509_fingerprint(cert, method, raw_output);
- if (fingerprint) {
- RETVAL_STR(fingerprint);
- } else {
- RETVAL_FALSE;
- }
- if (Z_TYPE_P(zcert) != IS_RESOURCE) {
- X509_free(cert);
- }
- }
- PHP_FUNCTION(openssl_x509_check_private_key)
- {
- zval * zcert, *zkey;
- X509 * cert = NULL;
- EVP_PKEY * key = NULL;
- zend_resource *keyresource = NULL;
- RETVAL_FALSE;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "zz", &zcert, &zkey) == FAILURE) {
- return;
- }
- cert = php_openssl_x509_from_zval(zcert, 0, NULL);
- if (cert == NULL) {
- RETURN_FALSE;
- }
- key = php_openssl_evp_from_zval(zkey, 0, "", 0, 1, &keyresource);
- if (key) {
- RETVAL_BOOL(X509_check_private_key(cert, key));
- }
- if (keyresource == NULL && key) {
- EVP_PKEY_free(key);
- }
- if (Z_TYPE_P(zcert) != IS_RESOURCE) {
- X509_free(cert);
- }
- }
- static int openssl_x509v3_subjectAltName(BIO *bio, X509_EXTENSION *extension)
- {
- GENERAL_NAMES *names;
- const X509V3_EXT_METHOD *method = NULL;
- ASN1_OCTET_STRING *extension_data;
- long i, length, num;
- const unsigned char *p;
- method = X509V3_EXT_get(extension);
- if (method == NULL) {
- return -1;
- }
- extension_data = X509_EXTENSION_get_data(extension);
- p = extension_data->data;
- length = extension_data->length;
- if (method->it) {
- names = (GENERAL_NAMES*) (ASN1_item_d2i(NULL, &p, length,
- ASN1_ITEM_ptr(method->it)));
- } else {
- names = (GENERAL_NAMES*) (method->d2i(NULL, &p, length));
- }
- if (names == NULL) {
- php_openssl_store_errors();
- return -1;
- }
- num = sk_GENERAL_NAME_num(names);
- for (i = 0; i < num; i++) {
- GENERAL_NAME *name;
- ASN1_STRING *as;
- name = sk_GENERAL_NAME_value(names, i);
- switch (name->type) {
- case GEN_EMAIL:
- BIO_puts(bio, "email:");
- as = name->d.rfc822Name;
- BIO_write(bio, ASN1_STRING_get0_data(as),
- ASN1_STRING_length(as));
- break;
- case GEN_DNS:
- BIO_puts(bio, "DNS:");
- as = name->d.dNSName;
- BIO_write(bio, ASN1_STRING_get0_data(as),
- ASN1_STRING_length(as));
- break;
- case GEN_URI:
- BIO_puts(bio, "URI:");
- as = name->d.uniformResourceIdentifier;
- BIO_write(bio, ASN1_STRING_get0_data(as),
- ASN1_STRING_length(as));
- break;
- default:
-
- GENERAL_NAME_print(bio, name);
- }
-
- if (i < (num - 1)) {
- BIO_puts(bio, ", ");
- }
- }
- sk_GENERAL_NAME_pop_free(names, GENERAL_NAME_free);
- return 0;
- }
- PHP_FUNCTION(openssl_x509_parse)
- {
- zval * zcert;
- X509 * cert = NULL;
- int i, sig_nid;
- zend_bool useshortnames = 1;
- char * tmpstr;
- zval subitem;
- X509_EXTENSION *extension;
- X509_NAME *subject_name;
- char *cert_name;
- char *extname;
- BIO *bio_out;
- BUF_MEM *bio_buf;
- ASN1_INTEGER *asn1_serial;
- BIGNUM *bn_serial;
- char *str_serial;
- char *hex_serial;
- char buf[256];
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "z|b", &zcert, &useshortnames) == FAILURE) {
- return;
- }
- cert = php_openssl_x509_from_zval(zcert, 0, NULL);
- if (cert == NULL) {
- RETURN_FALSE;
- }
- array_init(return_value);
- subject_name = X509_get_subject_name(cert);
- cert_name = X509_NAME_oneline(subject_name, NULL, 0);
- add_assoc_string(return_value, "name", cert_name);
- OPENSSL_free(cert_name);
- php_openssl_add_assoc_name_entry(return_value, "subject", subject_name, useshortnames);
-
- {
- char buf[32];
- snprintf(buf, sizeof(buf), "%08lx", X509_subject_name_hash(cert));
- add_assoc_string(return_value, "hash", buf);
- }
- php_openssl_add_assoc_name_entry(return_value, "issuer", X509_get_issuer_name(cert), useshortnames);
- add_assoc_long(return_value, "version", X509_get_version(cert));
- asn1_serial = X509_get_serialNumber(cert);
- bn_serial = ASN1_INTEGER_to_BN(asn1_serial, NULL);
-
- if (!bn_serial) {
- php_openssl_store_errors();
- RETURN_FALSE;
- }
- hex_serial = BN_bn2hex(bn_serial);
- BN_free(bn_serial);
-
- if (!hex_serial) {
- php_openssl_store_errors();
- RETURN_FALSE;
- }
- str_serial = i2s_ASN1_INTEGER(NULL, asn1_serial);
- add_assoc_string(return_value, "serialNumber", str_serial);
- OPENSSL_free(str_serial);
-
- add_assoc_string(return_value, "serialNumberHex", hex_serial);
- OPENSSL_free(hex_serial);
- php_openssl_add_assoc_asn1_string(return_value, "validFrom", X509_get_notBefore(cert));
- php_openssl_add_assoc_asn1_string(return_value, "validTo", X509_get_notAfter(cert));
- add_assoc_long(return_value, "validFrom_time_t", php_openssl_asn1_time_to_time_t(X509_get_notBefore(cert)));
- add_assoc_long(return_value, "validTo_time_t", php_openssl_asn1_time_to_time_t(X509_get_notAfter(cert)));
- tmpstr = (char *)X509_alias_get0(cert, NULL);
- if (tmpstr) {
- add_assoc_string(return_value, "alias", tmpstr);
- }
- sig_nid = X509_get_signature_nid(cert);
- add_assoc_string(return_value, "signatureTypeSN", (char*)OBJ_nid2sn(sig_nid));
- add_assoc_string(return_value, "signatureTypeLN", (char*)OBJ_nid2ln(sig_nid));
- add_assoc_long(return_value, "signatureTypeNID", sig_nid);
- array_init(&subitem);
-
- for (i = 0; i < X509_PURPOSE_get_count(); i++) {
- int id, purpset;
- char * pname;
- X509_PURPOSE * purp;
- zval subsub;
- array_init(&subsub);
- purp = X509_PURPOSE_get0(i);
- id = X509_PURPOSE_get_id(purp);
- purpset = X509_check_purpose(cert, id, 0);
- add_index_bool(&subsub, 0, purpset);
- purpset = X509_check_purpose(cert, id, 1);
- add_index_bool(&subsub, 1, purpset);
- pname = useshortnames ? X509_PURPOSE_get0_sname(purp) : X509_PURPOSE_get0_name(purp);
- add_index_string(&subsub, 2, pname);
-
- add_index_zval(&subitem, id, &subsub);
- }
- add_assoc_zval(return_value, "purposes", &subitem);
- array_init(&subitem);
- for (i = 0; i < X509_get_ext_count(cert); i++) {
- int nid;
- extension = X509_get_ext(cert, i);
- nid = OBJ_obj2nid(X509_EXTENSION_get_object(extension));
- if (nid != NID_undef) {
- extname = (char *)OBJ_nid2sn(OBJ_obj2nid(X509_EXTENSION_get_object(extension)));
- } else {
- OBJ_obj2txt(buf, sizeof(buf)-1, X509_EXTENSION_get_object(extension), 1);
- extname = buf;
- }
- bio_out = BIO_new(BIO_s_mem());
- if (bio_out == NULL) {
- php_openssl_store_errors();
- RETURN_FALSE;
- }
- if (nid == NID_subject_alt_name) {
- if (openssl_x509v3_subjectAltName(bio_out, extension) == 0) {
- BIO_get_mem_ptr(bio_out, &bio_buf);
- add_assoc_stringl(&subitem, extname, bio_buf->data, bio_buf->length);
- } else {
- zend_array_destroy(Z_ARR_P(return_value));
- BIO_free(bio_out);
- if (Z_TYPE_P(zcert) != IS_RESOURCE) {
- X509_free(cert);
- }
- RETURN_FALSE;
- }
- }
- else if (X509V3_EXT_print(bio_out, extension, 0, 0)) {
- BIO_get_mem_ptr(bio_out, &bio_buf);
- add_assoc_stringl(&subitem, extname, bio_buf->data, bio_buf->length);
- } else {
- php_openssl_add_assoc_asn1_string(&subitem, extname, X509_EXTENSION_get_data(extension));
- }
- BIO_free(bio_out);
- }
- add_assoc_zval(return_value, "extensions", &subitem);
- if (Z_TYPE_P(zcert) != IS_RESOURCE) {
- X509_free(cert);
- }
- }
- static STACK_OF(X509) *php_openssl_load_all_certs_from_file(char *certfile)
- {
- STACK_OF(X509_INFO) *sk=NULL;
- STACK_OF(X509) *stack=NULL, *ret=NULL;
- BIO *in=NULL;
- X509_INFO *xi;
- if(!(stack = sk_X509_new_null())) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_ERROR, "memory allocation failure");
- goto end;
- }
- if (php_openssl_open_base_dir_chk(certfile)) {
- sk_X509_free(stack);
- goto end;
- }
- if (!(in=BIO_new_file(certfile, PHP_OPENSSL_BIO_MODE_R(PKCS7_BINARY)))) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "error opening the file, %s", certfile);
- sk_X509_free(stack);
- goto end;
- }
-
- if (!(sk=PEM_X509_INFO_read_bio(in, NULL, NULL, NULL))) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "error reading the file, %s", certfile);
- sk_X509_free(stack);
- goto end;
- }
-
- while (sk_X509_INFO_num(sk)) {
- xi=sk_X509_INFO_shift(sk);
- if (xi->x509 != NULL) {
- sk_X509_push(stack,xi->x509);
- xi->x509=NULL;
- }
- X509_INFO_free(xi);
- }
- if (!sk_X509_num(stack)) {
- php_error_docref(NULL, E_WARNING, "no certificates in file, %s", certfile);
- sk_X509_free(stack);
- goto end;
- }
- ret = stack;
- end:
- BIO_free(in);
- sk_X509_INFO_free(sk);
- return ret;
- }
- static int check_cert(X509_STORE *ctx, X509 *x, STACK_OF(X509) *untrustedchain, int purpose)
- {
- int ret=0;
- X509_STORE_CTX *csc;
- csc = X509_STORE_CTX_new();
- if (csc == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_ERROR, "memory allocation failure");
- return 0;
- }
- if (!X509_STORE_CTX_init(csc, ctx, x, untrustedchain)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "cert store initialization failed");
- return 0;
- }
- if (purpose >= 0 && !X509_STORE_CTX_set_purpose(csc, purpose)) {
- php_openssl_store_errors();
- }
- ret = X509_verify_cert(csc);
- if (ret < 0) {
- php_openssl_store_errors();
- }
- X509_STORE_CTX_free(csc);
- return ret;
- }
- PHP_FUNCTION(openssl_x509_checkpurpose)
- {
- zval * zcert, * zcainfo = NULL;
- X509_STORE * cainfo = NULL;
- X509 * cert = NULL;
- STACK_OF(X509) * untrustedchain = NULL;
- zend_long purpose;
- char * untrusted = NULL;
- size_t untrusted_len = 0;
- int ret;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "zl|a!s", &zcert, &purpose, &zcainfo, &untrusted, &untrusted_len) == FAILURE) {
- return;
- }
- RETVAL_LONG(-1);
- if (untrusted) {
- untrustedchain = php_openssl_load_all_certs_from_file(untrusted);
- if (untrustedchain == NULL) {
- goto clean_exit;
- }
- }
- cainfo = php_openssl_setup_verify(zcainfo);
- if (cainfo == NULL) {
- goto clean_exit;
- }
- cert = php_openssl_x509_from_zval(zcert, 0, NULL);
- if (cert == NULL) {
- goto clean_exit;
- }
- ret = check_cert(cainfo, cert, untrustedchain, (int)purpose);
- if (ret != 0 && ret != 1) {
- RETVAL_LONG(ret);
- } else {
- RETVAL_BOOL(ret);
- }
- if (Z_TYPE_P(zcert) != IS_RESOURCE) {
- X509_free(cert);
- }
- clean_exit:
- if (cainfo) {
- X509_STORE_free(cainfo);
- }
- if (untrustedchain) {
- sk_X509_pop_free(untrustedchain, X509_free);
- }
- }
- static X509_STORE *php_openssl_setup_verify(zval *calist)
- {
- X509_STORE *store;
- X509_LOOKUP * dir_lookup, * file_lookup;
- int ndirs = 0, nfiles = 0;
- zval * item;
- zend_stat_t sb;
- store = X509_STORE_new();
- if (store == NULL) {
- php_openssl_store_errors();
- return NULL;
- }
- if (calist && (Z_TYPE_P(calist) == IS_ARRAY)) {
- ZEND_HASH_FOREACH_VAL(Z_ARRVAL_P(calist), item) {
- convert_to_string_ex(item);
- if (VCWD_STAT(Z_STRVAL_P(item), &sb) == -1) {
- php_error_docref(NULL, E_WARNING, "unable to stat %s", Z_STRVAL_P(item));
- continue;
- }
- if ((sb.st_mode & S_IFREG) == S_IFREG) {
- file_lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
- if (file_lookup == NULL || !X509_LOOKUP_load_file(file_lookup, Z_STRVAL_P(item), X509_FILETYPE_PEM)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "error loading file %s", Z_STRVAL_P(item));
- } else {
- nfiles++;
- }
- file_lookup = NULL;
- } else {
- dir_lookup = X509_STORE_add_lookup(store, X509_LOOKUP_hash_dir());
- if (dir_lookup == NULL || !X509_LOOKUP_add_dir(dir_lookup, Z_STRVAL_P(item), X509_FILETYPE_PEM)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "error loading directory %s", Z_STRVAL_P(item));
- } else {
- ndirs++;
- }
- dir_lookup = NULL;
- }
- } ZEND_HASH_FOREACH_END();
- }
- if (nfiles == 0) {
- file_lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
- if (file_lookup == NULL || !X509_LOOKUP_load_file(file_lookup, NULL, X509_FILETYPE_DEFAULT)) {
- php_openssl_store_errors();
- }
- }
- if (ndirs == 0) {
- dir_lookup = X509_STORE_add_lookup(store, X509_LOOKUP_hash_dir());
- if (dir_lookup == NULL || !X509_LOOKUP_add_dir(dir_lookup, NULL, X509_FILETYPE_DEFAULT)) {
- php_openssl_store_errors();
- }
- }
- return store;
- }
- PHP_FUNCTION(openssl_x509_read)
- {
- zval *cert;
- X509 *x509;
- zend_resource *res;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "z", &cert) == FAILURE) {
- return;
- }
- x509 = php_openssl_x509_from_zval(cert, 1, &res);
- ZVAL_RES(return_value, res);
- if (x509 == NULL) {
- php_error_docref(NULL, E_WARNING, "supplied parameter cannot be coerced into an X509 certificate!");
- RETURN_FALSE;
- }
- }
- PHP_FUNCTION(openssl_x509_free)
- {
- zval *x509;
- X509 *cert;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "r", &x509) == FAILURE) {
- return;
- }
- if ((cert = (X509 *)zend_fetch_resource(Z_RES_P(x509), "OpenSSL X.509", le_x509)) == NULL) {
- RETURN_FALSE;
- }
- zend_list_close(Z_RES_P(x509));
- }
- static void php_sk_X509_free(STACK_OF(X509) * sk)
- {
- for (;;) {
- X509* x = sk_X509_pop(sk);
- if (!x) break;
- X509_free(x);
- }
- sk_X509_free(sk);
- }
- static STACK_OF(X509) * php_array_to_X509_sk(zval * zcerts)
- {
- zval * zcertval;
- STACK_OF(X509) * sk = NULL;
- X509 * cert;
- zend_resource *certresource;
- sk = sk_X509_new_null();
-
- if (Z_TYPE_P(zcerts) == IS_ARRAY) {
- ZEND_HASH_FOREACH_VAL(Z_ARRVAL_P(zcerts), zcertval) {
- cert = php_openssl_x509_from_zval(zcertval, 0, &certresource);
- if (cert == NULL) {
- goto clean_exit;
- }
- if (certresource != NULL) {
- cert = X509_dup(cert);
- if (cert == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- }
- sk_X509_push(sk, cert);
- } ZEND_HASH_FOREACH_END();
- } else {
-
- cert = php_openssl_x509_from_zval(zcerts, 0, &certresource);
- if (cert == NULL) {
- goto clean_exit;
- }
- if (certresource != NULL) {
- cert = X509_dup(cert);
- if (cert == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- }
- sk_X509_push(sk, cert);
- }
- clean_exit:
- return sk;
- }
- PHP_FUNCTION(openssl_pkcs12_export_to_file)
- {
- X509 * cert = NULL;
- BIO * bio_out = NULL;
- PKCS12 * p12 = NULL;
- char * filename;
- char * friendly_name = NULL;
- size_t filename_len;
- char * pass;
- size_t pass_len;
- zval *zcert = NULL, *zpkey = NULL, *args = NULL;
- EVP_PKEY *priv_key = NULL;
- zend_resource *keyresource;
- zval * item;
- STACK_OF(X509) *ca = NULL;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "zpzs|a", &zcert, &filename, &filename_len, &zpkey, &pass, &pass_len, &args) == FAILURE)
- return;
- RETVAL_FALSE;
- cert = php_openssl_x509_from_zval(zcert, 0, NULL);
- if (cert == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get cert from parameter 1");
- return;
- }
- priv_key = php_openssl_evp_from_zval(zpkey, 0, "", 0, 1, &keyresource);
- if (priv_key == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get private key from parameter 3");
- goto cleanup;
- }
- if (!X509_check_private_key(cert, priv_key)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "private key does not correspond to cert");
- goto cleanup;
- }
- if (php_openssl_open_base_dir_chk(filename)) {
- goto cleanup;
- }
-
- if (args &&
- (item = zend_hash_str_find(Z_ARRVAL_P(args), "friendly_name", sizeof("friendly_name")-1)) != NULL &&
- Z_TYPE_P(item) == IS_STRING
- ) {
- friendly_name = Z_STRVAL_P(item);
- }
-
- if (args && (item = zend_hash_str_find(Z_ARRVAL_P(args), "extracerts", sizeof("extracerts")-1)) != NULL) {
- ca = php_array_to_X509_sk(item);
- }
-
-
- p12 = PKCS12_create(pass, friendly_name, priv_key, cert, ca, 0, 0, 0, 0, 0);
- if (p12 != NULL) {
- bio_out = BIO_new_file(filename, PHP_OPENSSL_BIO_MODE_W(PKCS7_BINARY));
- if (bio_out != NULL) {
- i2d_PKCS12_bio(bio_out, p12);
- BIO_free(bio_out);
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "error opening file %s", filename);
- }
- PKCS12_free(p12);
- } else {
- php_openssl_store_errors();
- }
- php_sk_X509_free(ca);
- cleanup:
- if (keyresource == NULL && priv_key) {
- EVP_PKEY_free(priv_key);
- }
- if (Z_TYPE_P(zcert) != IS_RESOURCE) {
- X509_free(cert);
- }
- }
- PHP_FUNCTION(openssl_pkcs12_export)
- {
- X509 * cert = NULL;
- BIO * bio_out;
- PKCS12 * p12 = NULL;
- zval * zcert = NULL, *zout = NULL, *zpkey, *args = NULL;
- EVP_PKEY *priv_key = NULL;
- zend_resource *keyresource;
- char * pass;
- size_t pass_len;
- char * friendly_name = NULL;
- zval * item;
- STACK_OF(X509) *ca = NULL;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "zz/zs|a", &zcert, &zout, &zpkey, &pass, &pass_len, &args) == FAILURE)
- return;
- RETVAL_FALSE;
- cert = php_openssl_x509_from_zval(zcert, 0, NULL);
- if (cert == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get cert from parameter 1");
- return;
- }
- priv_key = php_openssl_evp_from_zval(zpkey, 0, "", 0, 1, &keyresource);
- if (priv_key == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get private key from parameter 3");
- goto cleanup;
- }
- if (!X509_check_private_key(cert, priv_key)) {
- php_error_docref(NULL, E_WARNING, "private key does not correspond to cert");
- goto cleanup;
- }
-
- if (args &&
- (item = zend_hash_str_find(Z_ARRVAL_P(args), "friendly_name", sizeof("friendly_name")-1)) != NULL &&
- Z_TYPE_P(item) == IS_STRING
- ) {
- friendly_name = Z_STRVAL_P(item);
- }
- if (args && (item = zend_hash_str_find(Z_ARRVAL_P(args), "extracerts", sizeof("extracerts")-1)) != NULL) {
- ca = php_array_to_X509_sk(item);
- }
-
- p12 = PKCS12_create(pass, friendly_name, priv_key, cert, ca, 0, 0, 0, 0, 0);
- if (p12 != NULL) {
- bio_out = BIO_new(BIO_s_mem());
- if (i2d_PKCS12_bio(bio_out, p12)) {
- BUF_MEM *bio_buf;
- zval_ptr_dtor(zout);
- BIO_get_mem_ptr(bio_out, &bio_buf);
- ZVAL_STRINGL(zout, bio_buf->data, bio_buf->length);
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- }
- BIO_free(bio_out);
- PKCS12_free(p12);
- } else {
- php_openssl_store_errors();
- }
- php_sk_X509_free(ca);
- cleanup:
- if (keyresource == NULL && priv_key) {
- EVP_PKEY_free(priv_key);
- }
- if (Z_TYPE_P(zcert) != IS_RESOURCE) {
- X509_free(cert);
- }
- }
- PHP_FUNCTION(openssl_pkcs12_read)
- {
- zval *zout = NULL, zextracerts, zcert, zpkey;
- char *pass, *zp12;
- size_t pass_len, zp12_len;
- PKCS12 * p12 = NULL;
- EVP_PKEY * pkey = NULL;
- X509 * cert = NULL;
- STACK_OF(X509) * ca = NULL;
- BIO * bio_in = NULL;
- int i;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sz/s", &zp12, &zp12_len, &zout, &pass, &pass_len) == FAILURE)
- return;
- RETVAL_FALSE;
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(zp12_len, pkcs12);
- bio_in = BIO_new(BIO_s_mem());
- if (0 >= BIO_write(bio_in, zp12, (int)zp12_len)) {
- php_openssl_store_errors();
- goto cleanup;
- }
- if (d2i_PKCS12_bio(bio_in, &p12) && PKCS12_parse(p12, pass, &pkey, &cert, &ca)) {
- BIO * bio_out;
- int cert_num;
- zval_ptr_dtor(zout);
- array_init(zout);
- if (cert) {
- bio_out = BIO_new(BIO_s_mem());
- if (PEM_write_bio_X509(bio_out, cert)) {
- BUF_MEM *bio_buf;
- BIO_get_mem_ptr(bio_out, &bio_buf);
- ZVAL_STRINGL(&zcert, bio_buf->data, bio_buf->length);
- add_assoc_zval(zout, "cert", &zcert);
- } else {
- php_openssl_store_errors();
- }
- BIO_free(bio_out);
- }
- if (pkey) {
- bio_out = BIO_new(BIO_s_mem());
- if (PEM_write_bio_PrivateKey(bio_out, pkey, NULL, NULL, 0, 0, NULL)) {
- BUF_MEM *bio_buf;
- BIO_get_mem_ptr(bio_out, &bio_buf);
- ZVAL_STRINGL(&zpkey, bio_buf->data, bio_buf->length);
- add_assoc_zval(zout, "pkey", &zpkey);
- } else {
- php_openssl_store_errors();
- }
- BIO_free(bio_out);
- }
- cert_num = sk_X509_num(ca);
- if (ca && cert_num) {
- array_init(&zextracerts);
- for (i = 0; i < cert_num; i++) {
- zval zextracert;
- X509* aCA = sk_X509_pop(ca);
- if (!aCA) break;
- bio_out = BIO_new(BIO_s_mem());
- if (PEM_write_bio_X509(bio_out, aCA)) {
- BUF_MEM *bio_buf;
- BIO_get_mem_ptr(bio_out, &bio_buf);
- ZVAL_STRINGL(&zextracert, bio_buf->data, bio_buf->length);
- add_index_zval(&zextracerts, i, &zextracert);
- }
- X509_free(aCA);
- BIO_free(bio_out);
- }
- sk_X509_free(ca);
- add_assoc_zval(zout, "extracerts", &zextracerts);
- }
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- }
- cleanup:
- if (bio_in) {
- BIO_free(bio_in);
- }
- if (pkey) {
- EVP_PKEY_free(pkey);
- }
- if (cert) {
- X509_free(cert);
- }
- if (p12) {
- PKCS12_free(p12);
- }
- }
- static int php_openssl_make_REQ(struct php_x509_request * req, X509_REQ * csr, zval * dn, zval * attribs)
- {
- STACK_OF(CONF_VALUE) * dn_sk, *attr_sk = NULL;
- char * str, *dn_sect, *attr_sect;
- dn_sect = CONF_get_string(req->req_config, req->section_name, "distinguished_name");
- if (dn_sect == NULL) {
- php_openssl_store_errors();
- return FAILURE;
- }
- dn_sk = CONF_get_section(req->req_config, dn_sect);
- if (dn_sk == NULL) {
- php_openssl_store_errors();
- return FAILURE;
- }
- attr_sect = CONF_get_string(req->req_config, req->section_name, "attributes");
- if (attr_sect == NULL) {
- php_openssl_store_errors();
- attr_sk = NULL;
- } else {
- attr_sk = CONF_get_section(req->req_config, attr_sect);
- if (attr_sk == NULL) {
- php_openssl_store_errors();
- return FAILURE;
- }
- }
-
- if (X509_REQ_set_version(csr, 0L)) {
- int i, nid;
- char * type;
- CONF_VALUE * v;
- X509_NAME * subj;
- zval * item;
- zend_string * strindex = NULL;
- subj = X509_REQ_get_subject_name(csr);
-
- ZEND_HASH_FOREACH_STR_KEY_VAL(Z_ARRVAL_P(dn), strindex, item) {
- if (strindex) {
- int nid;
- convert_to_string_ex(item);
- nid = OBJ_txt2nid(ZSTR_VAL(strindex));
- if (nid != NID_undef) {
- if (!X509_NAME_add_entry_by_NID(subj, nid, MBSTRING_UTF8,
- (unsigned char*)Z_STRVAL_P(item), -1, -1, 0))
- {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING,
- "dn: add_entry_by_NID %d -> %s (failed; check error"
- " queue and value of string_mask OpenSSL option "
- "if illegal characters are reported)",
- nid, Z_STRVAL_P(item));
- return FAILURE;
- }
- } else {
- php_error_docref(NULL, E_WARNING, "dn: %s is not a recognized name", ZSTR_VAL(strindex));
- }
- }
- } ZEND_HASH_FOREACH_END();
-
- for(i = 0; i < sk_CONF_VALUE_num(dn_sk); i++) {
- size_t len;
- char buffer[200 + 1];
- v = sk_CONF_VALUE_value(dn_sk, i);
- type = v->name;
- len = strlen(type);
- if (len < sizeof("_default")) {
- continue;
- }
- len -= sizeof("_default") - 1;
- if (strcmp("_default", type + len) != 0) {
- continue;
- }
- if (len > 200) {
- len = 200;
- }
- memcpy(buffer, type, len);
- buffer[len] = '\0';
- type = buffer;
-
- for (str = type; *str; str++) {
- if (*str == ':' || *str == ',' || *str == '.') {
- str++;
- if (*str) {
- type = str;
- }
- break;
- }
- }
-
- nid = OBJ_txt2nid(type);
- if (X509_NAME_get_index_by_NID(subj, nid, -1) >= 0) {
- continue;
- }
- if (!X509_NAME_add_entry_by_txt(subj, type, MBSTRING_UTF8, (unsigned char*)v->value, -1, -1, 0)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "add_entry_by_txt %s -> %s (failed)", type, v->value);
- return FAILURE;
- }
- if (!X509_NAME_entry_count(subj)) {
- php_error_docref(NULL, E_WARNING, "no objects specified in config file");
- return FAILURE;
- }
- }
- if (attribs) {
- ZEND_HASH_FOREACH_STR_KEY_VAL(Z_ARRVAL_P(attribs), strindex, item) {
- int nid;
- if (NULL == strindex) {
- php_error_docref(NULL, E_WARNING, "dn: numeric fild names are not supported");
- continue;
- }
- convert_to_string_ex(item);
- nid = OBJ_txt2nid(ZSTR_VAL(strindex));
- if (nid != NID_undef) {
- if (!X509_NAME_add_entry_by_NID(subj, nid, MBSTRING_UTF8, (unsigned char*)Z_STRVAL_P(item), -1, -1, 0)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "attribs: add_entry_by_NID %d -> %s (failed)", nid, Z_STRVAL_P(item));
- return FAILURE;
- }
- } else {
- php_error_docref(NULL, E_WARNING, "dn: %s is not a recognized name", ZSTR_VAL(strindex));
- }
- } ZEND_HASH_FOREACH_END();
- for (i = 0; i < sk_CONF_VALUE_num(attr_sk); i++) {
- v = sk_CONF_VALUE_value(attr_sk, i);
-
- nid = OBJ_txt2nid(v->name);
- if (X509_REQ_get_attr_by_NID(csr, nid, -1) >= 0) {
- continue;
- }
- if (!X509_REQ_add1_attr_by_txt(csr, v->name, MBSTRING_UTF8, (unsigned char*)v->value, -1)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING,
- "add1_attr_by_txt %s -> %s (failed; check error queue "
- "and value of string_mask OpenSSL option if illegal "
- "characters are reported)",
- v->name, v->value);
- return FAILURE;
- }
- }
- }
- } else {
- php_openssl_store_errors();
- }
- if (!X509_REQ_set_pubkey(csr, req->priv_key)) {
- php_openssl_store_errors();
- }
- return SUCCESS;
- }
- static X509_REQ * php_openssl_csr_from_zval(zval * val, int makeresource, zend_resource **resourceval)
- {
- X509_REQ * csr = NULL;
- char * filename = NULL;
- BIO * in;
- if (resourceval) {
- *resourceval = NULL;
- }
- if (Z_TYPE_P(val) == IS_RESOURCE) {
- void * what;
- zend_resource *res = Z_RES_P(val);
- what = zend_fetch_resource(res, "OpenSSL X.509 CSR", le_csr);
- if (what) {
- if (resourceval) {
- *resourceval = res;
- if (makeresource) {
- Z_ADDREF_P(val);
- }
- }
- return (X509_REQ*)what;
- }
- return NULL;
- } else if (Z_TYPE_P(val) != IS_STRING) {
- return NULL;
- }
- if (Z_STRLEN_P(val) > 7 && memcmp(Z_STRVAL_P(val), "file://", sizeof("file://") - 1) == 0) {
- filename = Z_STRVAL_P(val) + (sizeof("file://") - 1);
- }
- if (filename) {
- if (php_openssl_open_base_dir_chk(filename)) {
- return NULL;
- }
- in = BIO_new_file(filename, PHP_OPENSSL_BIO_MODE_R(PKCS7_BINARY));
- } else {
- in = BIO_new_mem_buf(Z_STRVAL_P(val), (int)Z_STRLEN_P(val));
- }
- if (in == NULL) {
- php_openssl_store_errors();
- return NULL;
- }
- csr = PEM_read_bio_X509_REQ(in, NULL,NULL,NULL);
- if (csr == NULL) {
- php_openssl_store_errors();
- }
- BIO_free(in);
- return csr;
- }
- PHP_FUNCTION(openssl_csr_export_to_file)
- {
- X509_REQ * csr;
- zval * zcsr = NULL;
- zend_bool notext = 1;
- char * filename = NULL;
- size_t filename_len;
- BIO * bio_out;
- zend_resource *csr_resource;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "rp|b", &zcsr, &filename, &filename_len, ¬ext) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- csr = php_openssl_csr_from_zval(zcsr, 0, &csr_resource);
- if (csr == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get CSR from parameter 1");
- return;
- }
- if (php_openssl_open_base_dir_chk(filename)) {
- return;
- }
- bio_out = BIO_new_file(filename, PHP_OPENSSL_BIO_MODE_W(PKCS7_BINARY));
- if (bio_out != NULL) {
- if (!notext && !X509_REQ_print(bio_out, csr)) {
- php_openssl_store_errors();
- }
- if (!PEM_write_bio_X509_REQ(bio_out, csr)) {
- php_error_docref(NULL, E_WARNING, "error writing PEM to file %s", filename);
- php_openssl_store_errors();
- } else {
- RETVAL_TRUE;
- }
- BIO_free(bio_out);
- } else {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "error opening file %s", filename);
- }
- if (csr_resource == NULL && csr != NULL) {
- X509_REQ_free(csr);
- }
- }
- PHP_FUNCTION(openssl_csr_export)
- {
- X509_REQ * csr;
- zval * zcsr = NULL, *zout=NULL;
- zend_bool notext = 1;
- BIO * bio_out;
- zend_resource *csr_resource;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "rz/|b", &zcsr, &zout, ¬ext) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- csr = php_openssl_csr_from_zval(zcsr, 0, &csr_resource);
- if (csr == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get CSR from parameter 1");
- return;
- }
-
- bio_out = BIO_new(BIO_s_mem());
- if (!notext && !X509_REQ_print(bio_out, csr)) {
- php_openssl_store_errors();
- }
- if (PEM_write_bio_X509_REQ(bio_out, csr)) {
- BUF_MEM *bio_buf;
- BIO_get_mem_ptr(bio_out, &bio_buf);
- zval_ptr_dtor(zout);
- ZVAL_STRINGL(zout, bio_buf->data, bio_buf->length);
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- }
- if (csr_resource == NULL && csr) {
- X509_REQ_free(csr);
- }
- BIO_free(bio_out);
- }
- PHP_FUNCTION(openssl_csr_sign)
- {
- zval * zcert = NULL, *zcsr, *zpkey, *args = NULL;
- zend_long num_days;
- zend_long serial = Z_L(0);
- X509 * cert = NULL, *new_cert = NULL;
- X509_REQ * csr;
- EVP_PKEY * key = NULL, *priv_key = NULL;
- zend_resource *csr_resource, *certresource = NULL, *keyresource = NULL;
- int i;
- struct php_x509_request req;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "zz!zl|a!l", &zcsr, &zcert, &zpkey, &num_days, &args, &serial) == FAILURE)
- return;
- RETVAL_FALSE;
- PHP_SSL_REQ_INIT(&req);
- csr = php_openssl_csr_from_zval(zcsr, 0, &csr_resource);
- if (csr == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get CSR from parameter 1");
- return;
- }
- if (zcert) {
- cert = php_openssl_x509_from_zval(zcert, 0, &certresource);
- if (cert == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get cert from parameter 2");
- goto cleanup;
- }
- }
- priv_key = php_openssl_evp_from_zval(zpkey, 0, "", 0, 1, &keyresource);
- if (priv_key == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get private key from parameter 3");
- goto cleanup;
- }
- if (cert && !X509_check_private_key(cert, priv_key)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "private key does not correspond to signing cert");
- goto cleanup;
- }
- if (PHP_SSL_REQ_PARSE(&req, args) == FAILURE) {
- goto cleanup;
- }
-
- key = X509_REQ_get_pubkey(csr);
- if (key == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "error unpacking public key");
- goto cleanup;
- }
- i = X509_REQ_verify(csr, key);
- if (i < 0) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Signature verification problems");
- goto cleanup;
- }
- else if (i == 0) {
- php_error_docref(NULL, E_WARNING, "Signature did not match the certificate request");
- goto cleanup;
- }
-
- new_cert = X509_new();
- if (new_cert == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "No memory");
- goto cleanup;
- }
-
- if (!X509_set_version(new_cert, 2)) {
- goto cleanup;
- }
- ASN1_INTEGER_set(X509_get_serialNumber(new_cert), (long)serial);
- X509_set_subject_name(new_cert, X509_REQ_get_subject_name(csr));
- if (cert == NULL) {
- cert = new_cert;
- }
- if (!X509_set_issuer_name(new_cert, X509_get_subject_name(cert))) {
- php_openssl_store_errors();
- goto cleanup;
- }
- X509_gmtime_adj(X509_get_notBefore(new_cert), 0);
- X509_gmtime_adj(X509_get_notAfter(new_cert), 60*60*24*(long)num_days);
- i = X509_set_pubkey(new_cert, key);
- if (!i) {
- php_openssl_store_errors();
- goto cleanup;
- }
- if (req.extensions_section) {
- X509V3_CTX ctx;
- X509V3_set_ctx(&ctx, cert, new_cert, csr, NULL, 0);
- X509V3_set_conf_lhash(&ctx, req.req_config);
- if (!X509V3_EXT_add_conf(req.req_config, &ctx, req.extensions_section, new_cert)) {
- php_openssl_store_errors();
- goto cleanup;
- }
- }
-
- if (!X509_sign(new_cert, priv_key, req.digest)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "failed to sign it");
- goto cleanup;
- }
-
- ZVAL_RES(return_value, zend_register_resource(new_cert, le_x509));
- new_cert = NULL;
- cleanup:
- if (cert == new_cert) {
- cert = NULL;
- }
- PHP_SSL_REQ_DISPOSE(&req);
- if (keyresource == NULL && priv_key) {
- EVP_PKEY_free(priv_key);
- }
- if (key) {
- EVP_PKEY_free(key);
- }
- if (csr_resource == NULL && csr) {
- X509_REQ_free(csr);
- }
- if (zcert && certresource == NULL && cert) {
- X509_free(cert);
- }
- if (new_cert) {
- X509_free(new_cert);
- }
- }
- PHP_FUNCTION(openssl_csr_new)
- {
- struct php_x509_request req;
- zval * args = NULL, * dn, *attribs = NULL;
- zval * out_pkey;
- X509_REQ * csr = NULL;
- int we_made_the_key = 1;
- zend_resource *key_resource;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "az/|a!a!", &dn, &out_pkey, &args, &attribs) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- PHP_SSL_REQ_INIT(&req);
- if (PHP_SSL_REQ_PARSE(&req, args) == SUCCESS) {
-
- if (Z_TYPE_P(out_pkey) != IS_NULL) {
- req.priv_key = php_openssl_evp_from_zval(out_pkey, 0, NULL, 0, 0, &key_resource);
- if (req.priv_key != NULL) {
- we_made_the_key = 0;
- }
- }
- if (req.priv_key == NULL) {
- php_openssl_generate_private_key(&req);
- }
- if (req.priv_key == NULL) {
- php_error_docref(NULL, E_WARNING, "Unable to generate a private key");
- } else {
- csr = X509_REQ_new();
- if (csr) {
- if (php_openssl_make_REQ(&req, csr, dn, attribs) == SUCCESS) {
- X509V3_CTX ext_ctx;
- X509V3_set_ctx(&ext_ctx, NULL, NULL, csr, NULL, 0);
- X509V3_set_conf_lhash(&ext_ctx, req.req_config);
-
- if (req.request_extensions_section && !X509V3_EXT_REQ_add_conf(req.req_config,
- &ext_ctx, req.request_extensions_section, csr))
- {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Error loading extension section %s", req.request_extensions_section);
- } else {
- RETVAL_TRUE;
- if (X509_REQ_sign(csr, req.priv_key, req.digest)) {
- ZVAL_RES(return_value, zend_register_resource(csr, le_csr));
- csr = NULL;
- } else {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Error signing request");
- }
- if (we_made_the_key) {
-
- zval_ptr_dtor(out_pkey);
- ZVAL_RES(out_pkey, zend_register_resource(req.priv_key, le_key));
- req.priv_key = NULL;
- } else if (key_resource != NULL) {
- req.priv_key = NULL;
- }
- }
- }
- else {
- if (!we_made_the_key) {
-
- req.priv_key = NULL;
- }
- }
- } else {
- php_openssl_store_errors();
- }
- }
- }
- if (csr) {
- X509_REQ_free(csr);
- }
- PHP_SSL_REQ_DISPOSE(&req);
- }
- PHP_FUNCTION(openssl_csr_get_subject)
- {
- zval * zcsr;
- zend_bool use_shortnames = 1;
- zend_resource *csr_resource;
- X509_NAME * subject;
- X509_REQ * csr;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "z|b", &zcsr, &use_shortnames) == FAILURE) {
- return;
- }
- csr = php_openssl_csr_from_zval(zcsr, 0, &csr_resource);
- if (csr == NULL) {
- RETURN_FALSE;
- }
- subject = X509_REQ_get_subject_name(csr);
- array_init(return_value);
- php_openssl_add_assoc_name_entry(return_value, NULL, subject, use_shortnames);
- if (!csr_resource) {
- X509_REQ_free(csr);
- }
- }
- PHP_FUNCTION(openssl_csr_get_public_key)
- {
- zval * zcsr;
- zend_bool use_shortnames = 1;
- zend_resource *csr_resource;
- X509_REQ *orig_csr, *csr;
- EVP_PKEY *tpubkey;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "z|b", &zcsr, &use_shortnames) == FAILURE) {
- return;
- }
- orig_csr = php_openssl_csr_from_zval(zcsr, 0, &csr_resource);
- if (orig_csr == NULL) {
- RETURN_FALSE;
- }
- #if PHP_OPENSSL_API_VERSION >= 0x10100
-
- csr = X509_REQ_dup(orig_csr);
- #else
- csr = orig_csr;
- #endif
-
- tpubkey = X509_REQ_get_pubkey(csr);
- if (csr != orig_csr) {
-
- X509_REQ_free(csr);
- }
- if (!csr_resource) {
-
- X509_REQ_free(orig_csr);
- }
- if (tpubkey == NULL) {
- php_openssl_store_errors();
- RETURN_FALSE;
- }
- RETURN_RES(zend_register_resource(tpubkey, le_key));
- }
- struct php_openssl_pem_password {
- char *key;
- int len;
- };
- static int php_openssl_pem_password_cb(char *buf, int size, int rwflag, void *userdata)
- {
- struct php_openssl_pem_password *password = userdata;
- if (password == NULL || password->key == NULL) {
- return -1;
- }
- size = (password->len > size) ? size : password->len;
- memcpy(buf, password->key, size);
- return size;
- }
- static EVP_PKEY * php_openssl_evp_from_zval(
- zval * val, int public_key, char *passphrase, size_t passphrase_len,
- int makeresource, zend_resource **resourceval)
- {
- EVP_PKEY * key = NULL;
- X509 * cert = NULL;
- int free_cert = 0;
- zend_resource *cert_res = NULL;
- char * filename = NULL;
- zval tmp;
- ZVAL_NULL(&tmp);
- #define TMP_CLEAN \
- if (Z_TYPE(tmp) == IS_STRING) {\
- zval_ptr_dtor_str(&tmp); \
- } \
- return NULL;
- if (resourceval) {
- *resourceval = NULL;
- }
- if (Z_TYPE_P(val) == IS_ARRAY) {
- zval * zphrase;
-
- if ((zphrase = zend_hash_index_find(Z_ARRVAL_P(val), 1)) == NULL) {
- php_error_docref(NULL, E_WARNING, "key array must be of the form array(0 => key, 1 => phrase)");
- return NULL;
- }
- if (Z_TYPE_P(zphrase) == IS_STRING) {
- passphrase = Z_STRVAL_P(zphrase);
- passphrase_len = Z_STRLEN_P(zphrase);
- } else {
- ZVAL_COPY(&tmp, zphrase);
- convert_to_string(&tmp);
- passphrase = Z_STRVAL(tmp);
- passphrase_len = Z_STRLEN(tmp);
- }
-
- if ((val = zend_hash_index_find(Z_ARRVAL_P(val), 0)) == NULL) {
- php_error_docref(NULL, E_WARNING, "key array must be of the form array(0 => key, 1 => phrase)");
- TMP_CLEAN;
- }
- }
- if (Z_TYPE_P(val) == IS_RESOURCE) {
- void * what;
- zend_resource * res = Z_RES_P(val);
- what = zend_fetch_resource2(res, "OpenSSL X.509/key", le_x509, le_key);
- if (!what) {
- TMP_CLEAN;
- }
- if (resourceval) {
- *resourceval = res;
- Z_ADDREF_P(val);
- }
- if (res->type == le_x509) {
-
- cert = (X509*)what;
- free_cert = 0;
- } else if (res->type == le_key) {
- int is_priv;
- is_priv = php_openssl_is_private_key((EVP_PKEY*)what);
-
- if (!public_key && !is_priv) {
- php_error_docref(NULL, E_WARNING, "supplied key param is a public key");
- TMP_CLEAN;
- }
- if (public_key && is_priv) {
- php_error_docref(NULL, E_WARNING, "Don't know how to get public key from this private key");
- TMP_CLEAN;
- } else {
- if (Z_TYPE(tmp) == IS_STRING) {
- zval_ptr_dtor_str(&tmp);
- }
-
- return (EVP_PKEY*)what;
- }
- } else {
-
- TMP_CLEAN;
- }
- } else {
-
-
- if (!(Z_TYPE_P(val) == IS_STRING || Z_TYPE_P(val) == IS_OBJECT)) {
- TMP_CLEAN;
- }
- convert_to_string_ex(val);
- if (Z_STRLEN_P(val) > 7 && memcmp(Z_STRVAL_P(val), "file://", sizeof("file://") - 1) == 0) {
- filename = Z_STRVAL_P(val) + (sizeof("file://") - 1);
- if (php_openssl_open_base_dir_chk(filename)) {
- TMP_CLEAN;
- }
- }
-
- if (public_key) {
- cert = php_openssl_x509_from_zval(val, 0, &cert_res);
- free_cert = (cert_res == NULL);
-
- if (!cert) {
-
- BIO* in;
- if (filename) {
- in = BIO_new_file(filename, PHP_OPENSSL_BIO_MODE_R(PKCS7_BINARY));
- } else {
- in = BIO_new_mem_buf(Z_STRVAL_P(val), (int)Z_STRLEN_P(val));
- }
- if (in == NULL) {
- php_openssl_store_errors();
- TMP_CLEAN;
- }
- key = PEM_read_bio_PUBKEY(in, NULL,NULL, NULL);
- BIO_free(in);
- }
- } else {
-
- BIO *in;
- if (filename) {
- in = BIO_new_file(filename, PHP_OPENSSL_BIO_MODE_R(PKCS7_BINARY));
- } else {
- in = BIO_new_mem_buf(Z_STRVAL_P(val), (int)Z_STRLEN_P(val));
- }
- if (in == NULL) {
- TMP_CLEAN;
- }
- if (passphrase == NULL) {
- key = PEM_read_bio_PrivateKey(in, NULL, NULL, NULL);
- } else {
- struct php_openssl_pem_password password;
- password.key = passphrase;
- password.len = passphrase_len;
- key = PEM_read_bio_PrivateKey(in, NULL, php_openssl_pem_password_cb, &password);
- }
- BIO_free(in);
- }
- }
- if (key == NULL) {
- php_openssl_store_errors();
- if (public_key && cert) {
-
- key = (EVP_PKEY *) X509_get_pubkey(cert);
- if (key == NULL) {
- php_openssl_store_errors();
- }
- }
- }
- if (free_cert && cert) {
- X509_free(cert);
- }
- if (key && makeresource && resourceval) {
- *resourceval = zend_register_resource(key, le_key);
- }
- if (Z_TYPE(tmp) == IS_STRING) {
- zval_ptr_dtor_str(&tmp);
- }
- return key;
- }
- static EVP_PKEY * php_openssl_generate_private_key(struct php_x509_request * req)
- {
- char * randfile = NULL;
- int egdsocket, seeded;
- EVP_PKEY * return_val = NULL;
- if (req->priv_key_bits < MIN_KEY_LENGTH) {
- php_error_docref(NULL, E_WARNING, "private key length is too short; it needs to be at least %d bits, not %d",
- MIN_KEY_LENGTH, req->priv_key_bits);
- return NULL;
- }
- randfile = CONF_get_string(req->req_config, req->section_name, "RANDFILE");
- if (randfile == NULL) {
- php_openssl_store_errors();
- }
- php_openssl_load_rand_file(randfile, &egdsocket, &seeded);
- if ((req->priv_key = EVP_PKEY_new()) != NULL) {
- switch(req->priv_key_type) {
- case OPENSSL_KEYTYPE_RSA:
- {
- RSA* rsaparam;
- #if OPENSSL_VERSION_NUMBER < 0x10002000L
-
- PHP_OPENSSL_RAND_ADD_TIME();
- rsaparam = (RSA*)RSA_generate_key(req->priv_key_bits, RSA_F4, NULL, NULL);
- #else
- {
- BIGNUM *bne = (BIGNUM *)BN_new();
- if (BN_set_word(bne, RSA_F4) != 1) {
- BN_free(bne);
- php_error_docref(NULL, E_WARNING, "failed setting exponent");
- return NULL;
- }
- rsaparam = RSA_new();
- PHP_OPENSSL_RAND_ADD_TIME();
- if (rsaparam == NULL || !RSA_generate_key_ex(rsaparam, req->priv_key_bits, bne, NULL)) {
- php_openssl_store_errors();
- }
- BN_free(bne);
- }
- #endif
- if (rsaparam && EVP_PKEY_assign_RSA(req->priv_key, rsaparam)) {
- return_val = req->priv_key;
- } else {
- php_openssl_store_errors();
- }
- }
- break;
- #if !defined(NO_DSA)
- case OPENSSL_KEYTYPE_DSA:
- PHP_OPENSSL_RAND_ADD_TIME();
- {
- DSA *dsaparam = DSA_new();
- if (dsaparam && DSA_generate_parameters_ex(dsaparam, req->priv_key_bits, NULL, 0, NULL, NULL, NULL)) {
- DSA_set_method(dsaparam, DSA_get_default_method());
- if (DSA_generate_key(dsaparam)) {
- if (EVP_PKEY_assign_DSA(req->priv_key, dsaparam)) {
- return_val = req->priv_key;
- } else {
- php_openssl_store_errors();
- }
- } else {
- php_openssl_store_errors();
- DSA_free(dsaparam);
- }
- } else {
- php_openssl_store_errors();
- }
- }
- break;
- #endif
- #if !defined(NO_DH)
- case OPENSSL_KEYTYPE_DH:
- PHP_OPENSSL_RAND_ADD_TIME();
- {
- int codes = 0;
- DH *dhparam = DH_new();
- if (dhparam && DH_generate_parameters_ex(dhparam, req->priv_key_bits, 2, NULL)) {
- DH_set_method(dhparam, DH_get_default_method());
- if (DH_check(dhparam, &codes) && codes == 0 && DH_generate_key(dhparam)) {
- if (EVP_PKEY_assign_DH(req->priv_key, dhparam)) {
- return_val = req->priv_key;
- } else {
- php_openssl_store_errors();
- }
- } else {
- php_openssl_store_errors();
- DH_free(dhparam);
- }
- } else {
- php_openssl_store_errors();
- }
- }
- break;
- #endif
- #ifdef HAVE_EVP_PKEY_EC
- case OPENSSL_KEYTYPE_EC:
- {
- EC_KEY *eckey;
- if (req->curve_name == NID_undef) {
- php_error_docref(NULL, E_WARNING, "Missing configuration value: 'curve_name' not set");
- return NULL;
- }
- eckey = EC_KEY_new_by_curve_name(req->curve_name);
- if (eckey) {
- EC_KEY_set_asn1_flag(eckey, OPENSSL_EC_NAMED_CURVE);
- if (EC_KEY_generate_key(eckey) &&
- EVP_PKEY_assign_EC_KEY(req->priv_key, eckey)) {
- return_val = req->priv_key;
- } else {
- EC_KEY_free(eckey);
- }
- }
- }
- break;
- #endif
- default:
- php_error_docref(NULL, E_WARNING, "Unsupported private key type");
- }
- } else {
- php_openssl_store_errors();
- }
- php_openssl_write_rand_file(randfile, egdsocket, seeded);
- if (return_val == NULL) {
- EVP_PKEY_free(req->priv_key);
- req->priv_key = NULL;
- return NULL;
- }
- return return_val;
- }
- static int php_openssl_is_private_key(EVP_PKEY* pkey)
- {
- assert(pkey != NULL);
- switch (EVP_PKEY_id(pkey)) {
- case EVP_PKEY_RSA:
- case EVP_PKEY_RSA2:
- {
- RSA *rsa = EVP_PKEY_get0_RSA(pkey);
- if (rsa != NULL) {
- const BIGNUM *p, *q;
- RSA_get0_factors(rsa, &p, &q);
- if (p == NULL || q == NULL) {
- return 0;
- }
- }
- }
- break;
- case EVP_PKEY_DSA:
- case EVP_PKEY_DSA1:
- case EVP_PKEY_DSA2:
- case EVP_PKEY_DSA3:
- case EVP_PKEY_DSA4:
- {
- DSA *dsa = EVP_PKEY_get0_DSA(pkey);
- if (dsa != NULL) {
- const BIGNUM *p, *q, *g, *pub_key, *priv_key;
- DSA_get0_pqg(dsa, &p, &q, &g);
- if (p == NULL || q == NULL) {
- return 0;
- }
- DSA_get0_key(dsa, &pub_key, &priv_key);
- if (priv_key == NULL) {
- return 0;
- }
- }
- }
- break;
- case EVP_PKEY_DH:
- {
- DH *dh = EVP_PKEY_get0_DH(pkey);
- if (dh != NULL) {
- const BIGNUM *p, *q, *g, *pub_key, *priv_key;
- DH_get0_pqg(dh, &p, &q, &g);
- if (p == NULL) {
- return 0;
- }
- DH_get0_key(dh, &pub_key, &priv_key);
- if (priv_key == NULL) {
- return 0;
- }
- }
- }
- break;
- #ifdef HAVE_EVP_PKEY_EC
- case EVP_PKEY_EC:
- {
- EC_KEY *ec = EVP_PKEY_get0_EC_KEY(pkey);
- if (ec != NULL && NULL == EC_KEY_get0_private_key(ec)) {
- return 0;
- }
- }
- break;
- #endif
- default:
- php_error_docref(NULL, E_WARNING, "key type not supported in this PHP build!");
- break;
- }
- return 1;
- }
- #define OPENSSL_GET_BN(_array, _bn, _name) do { \
- if (_bn != NULL) { \
- int len = BN_num_bytes(_bn); \
- zend_string *str = zend_string_alloc(len, 0); \
- BN_bn2bin(_bn, (unsigned char*)ZSTR_VAL(str)); \
- ZSTR_VAL(str)[len] = 0; \
- add_assoc_str(&_array, #_name, str); \
- } \
- } while (0);
- #define OPENSSL_PKEY_GET_BN(_type, _name) OPENSSL_GET_BN(_type, _name, _name)
- #define OPENSSL_PKEY_SET_BN(_data, _name) do { \
- zval *bn; \
- if ((bn = zend_hash_str_find(Z_ARRVAL_P(_data), #_name, sizeof(#_name)-1)) != NULL && \
- Z_TYPE_P(bn) == IS_STRING) { \
- _name = BN_bin2bn( \
- (unsigned char*)Z_STRVAL_P(bn), \
- (int)Z_STRLEN_P(bn), NULL); \
- } else { \
- _name = NULL; \
- } \
- } while (0);
- static zend_bool php_openssl_pkey_init_and_assign_rsa(EVP_PKEY *pkey, RSA *rsa, zval *data)
- {
- BIGNUM *n, *e, *d, *p, *q, *dmp1, *dmq1, *iqmp;
- OPENSSL_PKEY_SET_BN(data, n);
- OPENSSL_PKEY_SET_BN(data, e);
- OPENSSL_PKEY_SET_BN(data, d);
- if (!n || !d || !RSA_set0_key(rsa, n, e, d)) {
- return 0;
- }
- OPENSSL_PKEY_SET_BN(data, p);
- OPENSSL_PKEY_SET_BN(data, q);
- if ((p || q) && !RSA_set0_factors(rsa, p, q)) {
- return 0;
- }
- OPENSSL_PKEY_SET_BN(data, dmp1);
- OPENSSL_PKEY_SET_BN(data, dmq1);
- OPENSSL_PKEY_SET_BN(data, iqmp);
- if ((dmp1 || dmq1 || iqmp) && !RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp)) {
- return 0;
- }
- if (!EVP_PKEY_assign_RSA(pkey, rsa)) {
- php_openssl_store_errors();
- return 0;
- }
- return 1;
- }
- static zend_bool php_openssl_pkey_init_dsa(DSA *dsa, zval *data)
- {
- BIGNUM *p, *q, *g, *priv_key, *pub_key;
- const BIGNUM *priv_key_const, *pub_key_const;
- OPENSSL_PKEY_SET_BN(data, p);
- OPENSSL_PKEY_SET_BN(data, q);
- OPENSSL_PKEY_SET_BN(data, g);
- if (!p || !q || !g || !DSA_set0_pqg(dsa, p, q, g)) {
- return 0;
- }
- OPENSSL_PKEY_SET_BN(data, pub_key);
- OPENSSL_PKEY_SET_BN(data, priv_key);
- if (pub_key) {
- return DSA_set0_key(dsa, pub_key, priv_key);
- }
-
- PHP_OPENSSL_RAND_ADD_TIME();
- if (!DSA_generate_key(dsa)) {
- php_openssl_store_errors();
- return 0;
- }
-
- DSA_get0_key(dsa, &pub_key_const, &priv_key_const);
- if (!pub_key_const || BN_is_zero(pub_key_const)) {
- return 0;
- }
-
- return 1;
- }
- static BIGNUM *php_openssl_dh_pub_from_priv(BIGNUM *priv_key, BIGNUM *g, BIGNUM *p)
- {
- BIGNUM *pub_key, *priv_key_const_time;
- BN_CTX *ctx;
- pub_key = BN_new();
- if (pub_key == NULL) {
- php_openssl_store_errors();
- return NULL;
- }
- priv_key_const_time = BN_new();
- if (priv_key_const_time == NULL) {
- BN_free(pub_key);
- php_openssl_store_errors();
- return NULL;
- }
- ctx = BN_CTX_new();
- if (ctx == NULL) {
- BN_free(pub_key);
- BN_free(priv_key_const_time);
- php_openssl_store_errors();
- return NULL;
- }
- BN_with_flags(priv_key_const_time, priv_key, BN_FLG_CONSTTIME);
- if (!BN_mod_exp_mont(pub_key, g, priv_key_const_time, p, ctx, NULL)) {
- BN_free(pub_key);
- php_openssl_store_errors();
- pub_key = NULL;
- }
- BN_free(priv_key_const_time);
- BN_CTX_free(ctx);
- return pub_key;
- }
- static zend_bool php_openssl_pkey_init_dh(DH *dh, zval *data)
- {
- BIGNUM *p, *q, *g, *priv_key, *pub_key;
- OPENSSL_PKEY_SET_BN(data, p);
- OPENSSL_PKEY_SET_BN(data, q);
- OPENSSL_PKEY_SET_BN(data, g);
- if (!p || !g || !DH_set0_pqg(dh, p, q, g)) {
- return 0;
- }
- OPENSSL_PKEY_SET_BN(data, priv_key);
- OPENSSL_PKEY_SET_BN(data, pub_key);
- if (pub_key) {
- return DH_set0_key(dh, pub_key, priv_key);
- }
- if (priv_key) {
- pub_key = php_openssl_dh_pub_from_priv(priv_key, g, p);
- if (pub_key == NULL) {
- return 0;
- }
- return DH_set0_key(dh, pub_key, priv_key);
- }
-
- PHP_OPENSSL_RAND_ADD_TIME();
- if (!DH_generate_key(dh)) {
- php_openssl_store_errors();
- return 0;
- }
-
- return 1;
- }
- PHP_FUNCTION(openssl_pkey_new)
- {
- struct php_x509_request req;
- zval * args = NULL;
- zval *data;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "|a!", &args) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- if (args && Z_TYPE_P(args) == IS_ARRAY) {
- EVP_PKEY *pkey;
- if ((data = zend_hash_str_find(Z_ARRVAL_P(args), "rsa", sizeof("rsa")-1)) != NULL &&
- Z_TYPE_P(data) == IS_ARRAY) {
- pkey = EVP_PKEY_new();
- if (pkey) {
- RSA *rsa = RSA_new();
- if (rsa) {
- if (php_openssl_pkey_init_and_assign_rsa(pkey, rsa, data)) {
- RETURN_RES(zend_register_resource(pkey, le_key));
- }
- RSA_free(rsa);
- } else {
- php_openssl_store_errors();
- }
- EVP_PKEY_free(pkey);
- } else {
- php_openssl_store_errors();
- }
- RETURN_FALSE;
- } else if ((data = zend_hash_str_find(Z_ARRVAL_P(args), "dsa", sizeof("dsa") - 1)) != NULL &&
- Z_TYPE_P(data) == IS_ARRAY) {
- pkey = EVP_PKEY_new();
- if (pkey) {
- DSA *dsa = DSA_new();
- if (dsa) {
- if (php_openssl_pkey_init_dsa(dsa, data)) {
- if (EVP_PKEY_assign_DSA(pkey, dsa)) {
- RETURN_RES(zend_register_resource(pkey, le_key));
- } else {
- php_openssl_store_errors();
- }
- }
- DSA_free(dsa);
- } else {
- php_openssl_store_errors();
- }
- EVP_PKEY_free(pkey);
- } else {
- php_openssl_store_errors();
- }
- RETURN_FALSE;
- } else if ((data = zend_hash_str_find(Z_ARRVAL_P(args), "dh", sizeof("dh") - 1)) != NULL &&
- Z_TYPE_P(data) == IS_ARRAY) {
- pkey = EVP_PKEY_new();
- if (pkey) {
- DH *dh = DH_new();
- if (dh) {
- if (php_openssl_pkey_init_dh(dh, data)) {
- if (EVP_PKEY_assign_DH(pkey, dh)) {
- ZVAL_COPY_VALUE(return_value, zend_list_insert(pkey, le_key));
- return;
- } else {
- php_openssl_store_errors();
- }
- }
- DH_free(dh);
- } else {
- php_openssl_store_errors();
- }
- EVP_PKEY_free(pkey);
- } else {
- php_openssl_store_errors();
- }
- RETURN_FALSE;
- #ifdef HAVE_EVP_PKEY_EC
- } else if ((data = zend_hash_str_find(Z_ARRVAL_P(args), "ec", sizeof("ec") - 1)) != NULL &&
- Z_TYPE_P(data) == IS_ARRAY) {
- EC_KEY *eckey = NULL;
- EC_GROUP *group = NULL;
- EC_POINT *pnt = NULL;
- BIGNUM *d = NULL;
- pkey = EVP_PKEY_new();
- if (pkey) {
- eckey = EC_KEY_new();
- if (eckey) {
- EC_GROUP *group = NULL;
- zval *bn;
- zval *x;
- zval *y;
- if ((bn = zend_hash_str_find(Z_ARRVAL_P(data), "curve_name", sizeof("curve_name") - 1)) != NULL &&
- Z_TYPE_P(bn) == IS_STRING) {
- int nid = OBJ_sn2nid(Z_STRVAL_P(bn));
- if (nid != NID_undef) {
- group = EC_GROUP_new_by_curve_name(nid);
- if (!group) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- EC_GROUP_set_asn1_flag(group, OPENSSL_EC_NAMED_CURVE);
- EC_GROUP_set_point_conversion_form(group, POINT_CONVERSION_UNCOMPRESSED);
- if (!EC_KEY_set_group(eckey, group)) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- }
- }
- if (group == NULL) {
- php_error_docref(NULL, E_WARNING, "Unknown curve_name");
- goto clean_exit;
- }
-
- if ((bn = zend_hash_str_find(Z_ARRVAL_P(data), "d", sizeof("d") - 1)) != NULL &&
- Z_TYPE_P(bn) == IS_STRING) {
- d = BN_bin2bn((unsigned char*) Z_STRVAL_P(bn), Z_STRLEN_P(bn), NULL);
- if (!EC_KEY_set_private_key(eckey, d)) {
- php_openssl_store_errors();
- goto clean_exit;
- }
-
-
- pnt = EC_POINT_new(group);
- if (!pnt || !EC_POINT_mul(group, pnt, d, NULL, NULL, NULL)) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- BN_free(d);
- } else if ((x = zend_hash_str_find(Z_ARRVAL_P(data), "x", sizeof("x") - 1)) != NULL &&
- Z_TYPE_P(x) == IS_STRING &&
- (y = zend_hash_str_find(Z_ARRVAL_P(data), "y", sizeof("y") - 1)) != NULL &&
- Z_TYPE_P(y) == IS_STRING) {
- pnt = EC_POINT_new(group);
- if (pnt == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- if (!EC_POINT_set_affine_coordinates_GFp(
- group, pnt, BN_bin2bn((unsigned char*) Z_STRVAL_P(x), Z_STRLEN_P(x), NULL),
- BN_bin2bn((unsigned char*) Z_STRVAL_P(y), Z_STRLEN_P(y), NULL), NULL)) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- }
- if (pnt != NULL) {
- if (!EC_KEY_set_public_key(eckey, pnt)) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- EC_POINT_free(pnt);
- pnt = NULL;
- }
- if (!EC_KEY_check_key(eckey)) {
- PHP_OPENSSL_RAND_ADD_TIME();
- EC_KEY_generate_key(eckey);
- php_openssl_store_errors();
- }
- if (EC_KEY_check_key(eckey) && EVP_PKEY_assign_EC_KEY(pkey, eckey)) {
- EC_GROUP_free(group);
- RETURN_RES(zend_register_resource(pkey, le_key));
- } else {
- php_openssl_store_errors();
- }
- } else {
- php_openssl_store_errors();
- }
- } else {
- php_openssl_store_errors();
- }
- clean_exit:
- if (d != NULL) {
- BN_free(d);
- }
- if (pnt != NULL) {
- EC_POINT_free(pnt);
- }
- if (group != NULL) {
- EC_GROUP_free(group);
- }
- if (eckey != NULL) {
- EC_KEY_free(eckey);
- }
- if (pkey != NULL) {
- EVP_PKEY_free(pkey);
- }
- RETURN_FALSE;
- #endif
- }
- }
- PHP_SSL_REQ_INIT(&req);
- if (PHP_SSL_REQ_PARSE(&req, args) == SUCCESS) {
- if (php_openssl_generate_private_key(&req)) {
-
- RETVAL_RES(zend_register_resource(req.priv_key, le_key));
-
- req.priv_key = NULL;
- }
- }
- PHP_SSL_REQ_DISPOSE(&req);
- }
- PHP_FUNCTION(openssl_pkey_export_to_file)
- {
- struct php_x509_request req;
- zval * zpkey, * args = NULL;
- char * passphrase = NULL;
- size_t passphrase_len = 0;
- char * filename = NULL;
- size_t filename_len = 0;
- zend_resource *key_resource = NULL;
- int pem_write = 0;
- EVP_PKEY * key;
- BIO * bio_out = NULL;
- const EVP_CIPHER * cipher;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "zp|s!a!", &zpkey, &filename, &filename_len, &passphrase, &passphrase_len, &args) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(passphrase_len, passphrase);
- key = php_openssl_evp_from_zval(zpkey, 0, passphrase, passphrase_len, 0, &key_resource);
- if (key == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get key from parameter 1");
- RETURN_FALSE;
- }
- if (php_openssl_open_base_dir_chk(filename)) {
- RETURN_FALSE;
- }
- PHP_SSL_REQ_INIT(&req);
- if (PHP_SSL_REQ_PARSE(&req, args) == SUCCESS) {
- bio_out = BIO_new_file(filename, PHP_OPENSSL_BIO_MODE_W(PKCS7_BINARY));
- if (bio_out == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- if (passphrase && req.priv_key_encrypt) {
- if (req.priv_key_encrypt_cipher) {
- cipher = req.priv_key_encrypt_cipher;
- } else {
- cipher = (EVP_CIPHER *) EVP_des_ede3_cbc();
- }
- } else {
- cipher = NULL;
- }
- switch (EVP_PKEY_base_id(key)) {
- #ifdef HAVE_EVP_PKEY_EC
- case EVP_PKEY_EC:
- pem_write = PEM_write_bio_ECPrivateKey(
- bio_out, EVP_PKEY_get0_EC_KEY(key), cipher,
- (unsigned char *)passphrase, (int)passphrase_len, NULL, NULL);
- break;
- #endif
- default:
- pem_write = PEM_write_bio_PrivateKey(
- bio_out, key, cipher,
- (unsigned char *)passphrase, (int)passphrase_len, NULL, NULL);
- break;
- }
- if (pem_write) {
-
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- }
- }
- clean_exit:
- PHP_SSL_REQ_DISPOSE(&req);
- if (key_resource == NULL && key) {
- EVP_PKEY_free(key);
- }
- if (bio_out) {
- BIO_free(bio_out);
- }
- }
- PHP_FUNCTION(openssl_pkey_export)
- {
- struct php_x509_request req;
- zval * zpkey, * args = NULL, *out;
- char * passphrase = NULL; size_t passphrase_len = 0;
- int pem_write = 0;
- zend_resource *key_resource = NULL;
- EVP_PKEY * key;
- BIO * bio_out = NULL;
- const EVP_CIPHER * cipher;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "zz/|s!a!", &zpkey, &out, &passphrase, &passphrase_len, &args) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(passphrase_len, passphrase);
- key = php_openssl_evp_from_zval(zpkey, 0, passphrase, passphrase_len, 0, &key_resource);
- if (key == NULL) {
- php_error_docref(NULL, E_WARNING, "cannot get key from parameter 1");
- RETURN_FALSE;
- }
- PHP_SSL_REQ_INIT(&req);
- if (PHP_SSL_REQ_PARSE(&req, args) == SUCCESS) {
- bio_out = BIO_new(BIO_s_mem());
- if (passphrase && req.priv_key_encrypt) {
- if (req.priv_key_encrypt_cipher) {
- cipher = req.priv_key_encrypt_cipher;
- } else {
- cipher = (EVP_CIPHER *) EVP_des_ede3_cbc();
- }
- } else {
- cipher = NULL;
- }
- switch (EVP_PKEY_base_id(key)) {
- #ifdef HAVE_EVP_PKEY_EC
- case EVP_PKEY_EC:
- pem_write = PEM_write_bio_ECPrivateKey(
- bio_out, EVP_PKEY_get0_EC_KEY(key), cipher,
- (unsigned char *)passphrase, (int)passphrase_len, NULL, NULL);
- break;
- #endif
- default:
- pem_write = PEM_write_bio_PrivateKey(
- bio_out, key, cipher,
- (unsigned char *)passphrase, (int)passphrase_len, NULL, NULL);
- break;
- }
- if (pem_write) {
-
- char * bio_mem_ptr;
- long bio_mem_len;
- RETVAL_TRUE;
- bio_mem_len = BIO_get_mem_data(bio_out, &bio_mem_ptr);
- zval_ptr_dtor(out);
- ZVAL_STRINGL(out, bio_mem_ptr, bio_mem_len);
- } else {
- php_openssl_store_errors();
- }
- }
- PHP_SSL_REQ_DISPOSE(&req);
- if (key_resource == NULL && key) {
- EVP_PKEY_free(key);
- }
- if (bio_out) {
- BIO_free(bio_out);
- }
- }
- PHP_FUNCTION(openssl_pkey_get_public)
- {
- zval *cert;
- EVP_PKEY *pkey;
- zend_resource *res;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "z", &cert) == FAILURE) {
- return;
- }
- pkey = php_openssl_evp_from_zval(cert, 1, NULL, 0, 1, &res);
- if (pkey == NULL) {
- RETURN_FALSE;
- }
- ZVAL_RES(return_value, res);
- }
- PHP_FUNCTION(openssl_pkey_free)
- {
- zval *key;
- EVP_PKEY *pkey;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "r", &key) == FAILURE) {
- return;
- }
- if ((pkey = (EVP_PKEY *)zend_fetch_resource(Z_RES_P(key), "OpenSSL key", le_key)) == NULL) {
- RETURN_FALSE;
- }
- zend_list_close(Z_RES_P(key));
- }
- PHP_FUNCTION(openssl_pkey_get_private)
- {
- zval *cert;
- EVP_PKEY *pkey;
- char * passphrase = "";
- size_t passphrase_len = sizeof("")-1;
- zend_resource *res;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "z|s", &cert, &passphrase, &passphrase_len) == FAILURE) {
- return;
- }
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(passphrase_len, passphrase);
- pkey = php_openssl_evp_from_zval(cert, 0, passphrase, passphrase_len, 1, &res);
- if (pkey == NULL) {
- RETURN_FALSE;
- }
- ZVAL_RES(return_value, res);
- }
- PHP_FUNCTION(openssl_pkey_get_details)
- {
- zval *key;
- EVP_PKEY *pkey;
- BIO *out;
- unsigned int pbio_len;
- char *pbio;
- zend_long ktype;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "r", &key) == FAILURE) {
- return;
- }
- if ((pkey = (EVP_PKEY *)zend_fetch_resource(Z_RES_P(key), "OpenSSL key", le_key)) == NULL) {
- RETURN_FALSE;
- }
- out = BIO_new(BIO_s_mem());
- if (!PEM_write_bio_PUBKEY(out, pkey)) {
- BIO_free(out);
- php_openssl_store_errors();
- RETURN_FALSE;
- }
- pbio_len = BIO_get_mem_data(out, &pbio);
- array_init(return_value);
- add_assoc_long(return_value, "bits", EVP_PKEY_bits(pkey));
- add_assoc_stringl(return_value, "key", pbio, pbio_len);
-
- switch (EVP_PKEY_base_id(pkey)) {
- case EVP_PKEY_RSA:
- case EVP_PKEY_RSA2:
- {
- RSA *rsa = EVP_PKEY_get0_RSA(pkey);
- ktype = OPENSSL_KEYTYPE_RSA;
- if (rsa != NULL) {
- zval z_rsa;
- const BIGNUM *n, *e, *d, *p, *q, *dmp1, *dmq1, *iqmp;
- RSA_get0_key(rsa, &n, &e, &d);
- RSA_get0_factors(rsa, &p, &q);
- RSA_get0_crt_params(rsa, &dmp1, &dmq1, &iqmp);
- array_init(&z_rsa);
- OPENSSL_PKEY_GET_BN(z_rsa, n);
- OPENSSL_PKEY_GET_BN(z_rsa, e);
- OPENSSL_PKEY_GET_BN(z_rsa, d);
- OPENSSL_PKEY_GET_BN(z_rsa, p);
- OPENSSL_PKEY_GET_BN(z_rsa, q);
- OPENSSL_PKEY_GET_BN(z_rsa, dmp1);
- OPENSSL_PKEY_GET_BN(z_rsa, dmq1);
- OPENSSL_PKEY_GET_BN(z_rsa, iqmp);
- add_assoc_zval(return_value, "rsa", &z_rsa);
- }
- }
- break;
- case EVP_PKEY_DSA:
- case EVP_PKEY_DSA2:
- case EVP_PKEY_DSA3:
- case EVP_PKEY_DSA4:
- {
- DSA *dsa = EVP_PKEY_get0_DSA(pkey);
- ktype = OPENSSL_KEYTYPE_DSA;
- if (dsa != NULL) {
- zval z_dsa;
- const BIGNUM *p, *q, *g, *priv_key, *pub_key;
- DSA_get0_pqg(dsa, &p, &q, &g);
- DSA_get0_key(dsa, &pub_key, &priv_key);
- array_init(&z_dsa);
- OPENSSL_PKEY_GET_BN(z_dsa, p);
- OPENSSL_PKEY_GET_BN(z_dsa, q);
- OPENSSL_PKEY_GET_BN(z_dsa, g);
- OPENSSL_PKEY_GET_BN(z_dsa, priv_key);
- OPENSSL_PKEY_GET_BN(z_dsa, pub_key);
- add_assoc_zval(return_value, "dsa", &z_dsa);
- }
- }
- break;
- case EVP_PKEY_DH:
- {
- DH *dh = EVP_PKEY_get0_DH(pkey);
- ktype = OPENSSL_KEYTYPE_DH;
- if (dh != NULL) {
- zval z_dh;
- const BIGNUM *p, *q, *g, *priv_key, *pub_key;
- DH_get0_pqg(dh, &p, &q, &g);
- DH_get0_key(dh, &pub_key, &priv_key);
- array_init(&z_dh);
- OPENSSL_PKEY_GET_BN(z_dh, p);
- OPENSSL_PKEY_GET_BN(z_dh, g);
- OPENSSL_PKEY_GET_BN(z_dh, priv_key);
- OPENSSL_PKEY_GET_BN(z_dh, pub_key);
- add_assoc_zval(return_value, "dh", &z_dh);
- }
- }
- break;
- #ifdef HAVE_EVP_PKEY_EC
- case EVP_PKEY_EC:
- ktype = OPENSSL_KEYTYPE_EC;
- if (EVP_PKEY_get0_EC_KEY(pkey) != NULL) {
- zval ec;
- const EC_GROUP *ec_group;
- const EC_POINT *pub;
- int nid;
- char *crv_sn;
- ASN1_OBJECT *obj;
-
- char oir_buf[80];
- const EC_KEY *ec_key = EVP_PKEY_get0_EC_KEY(pkey);
- BIGNUM *x = BN_new();
- BIGNUM *y = BN_new();
- const BIGNUM *d;
- ec_group = EC_KEY_get0_group(ec_key);
-
- nid = EC_GROUP_get_curve_name(ec_group);
- if (nid == NID_undef) {
- break;
- }
- array_init(&ec);
-
- crv_sn = (char*) OBJ_nid2sn(nid);
- if (crv_sn != NULL) {
- add_assoc_string(&ec, "curve_name", crv_sn);
- }
- obj = OBJ_nid2obj(nid);
- if (obj != NULL) {
- int oir_len = OBJ_obj2txt(oir_buf, sizeof(oir_buf), obj, 1);
- add_assoc_stringl(&ec, "curve_oid", (char*) oir_buf, oir_len);
- ASN1_OBJECT_free(obj);
- }
- pub = EC_KEY_get0_public_key(ec_key);
- if (EC_POINT_get_affine_coordinates_GFp(ec_group, pub, x, y, NULL)) {
- OPENSSL_GET_BN(ec, x, x);
- OPENSSL_GET_BN(ec, y, y);
- } else {
- php_openssl_store_errors();
- }
- if ((d = EC_KEY_get0_private_key(EVP_PKEY_get0_EC_KEY(pkey))) != NULL) {
- OPENSSL_GET_BN(ec, d, d);
- }
- add_assoc_zval(return_value, "ec", &ec);
- BN_free(x);
- BN_free(y);
- }
- break;
- #endif
- default:
- ktype = -1;
- break;
- }
- add_assoc_long(return_value, "type", ktype);
- BIO_free(out);
- }
- PHP_FUNCTION(openssl_dh_compute_key)
- {
- zval *key;
- char *pub_str;
- size_t pub_len;
- DH *dh;
- EVP_PKEY *pkey;
- BIGNUM *pub;
- zend_string *data;
- int len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sr", &pub_str, &pub_len, &key) == FAILURE) {
- return;
- }
- if ((pkey = (EVP_PKEY *)zend_fetch_resource(Z_RES_P(key), "OpenSSL key", le_key)) == NULL) {
- RETURN_FALSE;
- }
- if (EVP_PKEY_base_id(pkey) != EVP_PKEY_DH) {
- RETURN_FALSE;
- }
- dh = EVP_PKEY_get0_DH(pkey);
- if (dh == NULL) {
- RETURN_FALSE;
- }
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(pub_len, pub_key);
- pub = BN_bin2bn((unsigned char*)pub_str, (int)pub_len, NULL);
- data = zend_string_alloc(DH_size(dh), 0);
- len = DH_compute_key((unsigned char*)ZSTR_VAL(data), pub, dh);
- if (len >= 0) {
- ZSTR_LEN(data) = len;
- ZSTR_VAL(data)[len] = 0;
- RETVAL_NEW_STR(data);
- } else {
- php_openssl_store_errors();
- zend_string_release_ex(data, 0);
- RETVAL_FALSE;
- }
- BN_free(pub);
- }
- PHP_FUNCTION(openssl_pkey_derive)
- {
- zval *priv_key;
- zval *peer_pub_key;
- EVP_PKEY *pkey;
- EVP_PKEY *peer_key;
- size_t key_size;
- zend_long key_len = 0;
- zend_string *result;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "zz|l", &peer_pub_key, &priv_key, &key_len) == FAILURE) {
- RETURN_FALSE;
- }
- if (key_len < 0) {
- php_error_docref(NULL, E_WARNING, "keylen < 0, assuming NULL");
- }
- key_size = key_len;
- if ((pkey = php_openssl_evp_from_zval(priv_key, 0, "", 0, 0, NULL)) == NULL
- || (peer_key = php_openssl_evp_from_zval(peer_pub_key, 1, NULL, 0, 0, NULL)) == NULL) {
- RETURN_FALSE;
- }
- EVP_PKEY_CTX *ctx = EVP_PKEY_CTX_new(pkey, NULL);
- if (!ctx) {
- RETURN_FALSE;
- }
- if (EVP_PKEY_derive_init(ctx) > 0
- && EVP_PKEY_derive_set_peer(ctx, peer_key) > 0
- && (key_size > 0 || EVP_PKEY_derive(ctx, NULL, &key_size) > 0)
- && (result = zend_string_alloc(key_size, 0)) != NULL) {
- if (EVP_PKEY_derive(ctx, (unsigned char*)ZSTR_VAL(result), &key_size) > 0) {
- ZSTR_LEN(result) = key_size;
- ZSTR_VAL(result)[key_size] = 0;
- RETVAL_NEW_STR(result);
- } else {
- php_openssl_store_errors();
- zend_string_release_ex(result, 0);
- RETVAL_FALSE;
- }
- } else {
- RETVAL_FALSE;
- }
- EVP_PKEY_CTX_free(ctx);
- }
- PHP_FUNCTION(openssl_pbkdf2)
- {
- zend_long key_length = 0, iterations = 0;
- char *password;
- size_t password_len;
- char *salt;
- size_t salt_len;
- char *method;
- size_t method_len = 0;
- zend_string *out_buffer;
- const EVP_MD *digest;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssll|s",
- &password, &password_len,
- &salt, &salt_len,
- &key_length, &iterations,
- &method, &method_len) == FAILURE) {
- return;
- }
- if (key_length <= 0) {
- RETURN_FALSE;
- }
- if (method_len) {
- digest = EVP_get_digestbyname(method);
- } else {
- digest = EVP_sha1();
- }
- if (!digest) {
- php_error_docref(NULL, E_WARNING, "Unknown signature algorithm");
- RETURN_FALSE;
- }
- PHP_OPENSSL_CHECK_LONG_TO_INT(key_length, key);
- PHP_OPENSSL_CHECK_LONG_TO_INT(iterations, iterations);
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(password_len, password);
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(salt_len, salt);
- out_buffer = zend_string_alloc(key_length, 0);
- if (PKCS5_PBKDF2_HMAC(password, (int)password_len, (unsigned char *)salt, (int)salt_len, (int)iterations, digest, (int)key_length, (unsigned char*)ZSTR_VAL(out_buffer)) == 1) {
- ZSTR_VAL(out_buffer)[key_length] = 0;
- RETURN_NEW_STR(out_buffer);
- } else {
- php_openssl_store_errors();
- zend_string_release_ex(out_buffer, 0);
- RETURN_FALSE;
- }
- }
- PHP_FUNCTION(openssl_pkcs7_verify)
- {
- X509_STORE * store = NULL;
- zval * cainfo = NULL;
- STACK_OF(X509) *signers= NULL;
- STACK_OF(X509) *others = NULL;
- PKCS7 * p7 = NULL;
- BIO * in = NULL, * datain = NULL, * dataout = NULL, * p7bout = NULL;
- zend_long flags = 0;
- char * filename;
- size_t filename_len;
- char * extracerts = NULL;
- size_t extracerts_len = 0;
- char * signersfilename = NULL;
- size_t signersfilename_len = 0;
- char * datafilename = NULL;
- size_t datafilename_len = 0;
- char * p7bfilename = NULL;
- size_t p7bfilename_len = 0;
- RETVAL_LONG(-1);
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "pl|pappp", &filename, &filename_len,
- &flags, &signersfilename, &signersfilename_len, &cainfo,
- &extracerts, &extracerts_len, &datafilename, &datafilename_len, &p7bfilename, &p7bfilename_len) == FAILURE) {
- return;
- }
- if (extracerts) {
- others = php_openssl_load_all_certs_from_file(extracerts);
- if (others == NULL) {
- goto clean_exit;
- }
- }
- flags = flags & ~PKCS7_DETACHED;
- store = php_openssl_setup_verify(cainfo);
- if (!store) {
- goto clean_exit;
- }
- if (php_openssl_open_base_dir_chk(filename)) {
- goto clean_exit;
- }
- in = BIO_new_file(filename, PHP_OPENSSL_BIO_MODE_R(flags));
- if (in == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- p7 = SMIME_read_PKCS7(in, &datain);
- if (p7 == NULL) {
- #if DEBUG_SMIME
- zend_printf("SMIME_read_PKCS7 failed\n");
- #endif
- php_openssl_store_errors();
- goto clean_exit;
- }
- if (datafilename) {
- if (php_openssl_open_base_dir_chk(datafilename)) {
- goto clean_exit;
- }
- dataout = BIO_new_file(datafilename, PHP_OPENSSL_BIO_MODE_W(PKCS7_BINARY));
- if (dataout == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- }
- if (p7bfilename) {
- if (php_openssl_open_base_dir_chk(p7bfilename)) {
- goto clean_exit;
- }
- p7bout = BIO_new_file(p7bfilename, PHP_OPENSSL_BIO_MODE_W(PKCS7_BINARY));
- if (p7bout == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- }
- #if DEBUG_SMIME
- zend_printf("Calling PKCS7 verify\n");
- #endif
- if (PKCS7_verify(p7, others, store, datain, dataout, (int)flags)) {
- RETVAL_TRUE;
- if (signersfilename) {
- BIO *certout;
- if (php_openssl_open_base_dir_chk(signersfilename)) {
- goto clean_exit;
- }
- certout = BIO_new_file(signersfilename, PHP_OPENSSL_BIO_MODE_W(PKCS7_BINARY));
- if (certout) {
- int i;
- signers = PKCS7_get0_signers(p7, NULL, (int)flags);
- if (signers != NULL) {
- for (i = 0; i < sk_X509_num(signers); i++) {
- if (!PEM_write_bio_X509(certout, sk_X509_value(signers, i))) {
- php_openssl_store_errors();
- RETVAL_LONG(-1);
- php_error_docref(NULL, E_WARNING, "failed to write signer %d", i);
- }
- }
- sk_X509_free(signers);
- } else {
- RETVAL_LONG(-1);
- php_openssl_store_errors();
- }
- BIO_free(certout);
- } else {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "signature OK, but cannot open %s for writing", signersfilename);
- RETVAL_LONG(-1);
- }
- if (p7bout) {
- PEM_write_bio_PKCS7(p7bout, p7);
- }
- }
- } else {
- php_openssl_store_errors();
- RETVAL_FALSE;
- }
- clean_exit:
- if (p7bout) {
- BIO_free(p7bout);
- }
- X509_STORE_free(store);
- BIO_free(datain);
- BIO_free(in);
- BIO_free(dataout);
- PKCS7_free(p7);
- sk_X509_pop_free(others, X509_free);
- }
- PHP_FUNCTION(openssl_pkcs7_encrypt)
- {
- zval * zrecipcerts, * zheaders = NULL;
- STACK_OF(X509) * recipcerts = NULL;
- BIO * infile = NULL, * outfile = NULL;
- zend_long flags = 0;
- PKCS7 * p7 = NULL;
- zval * zcertval;
- X509 * cert;
- const EVP_CIPHER *cipher = NULL;
- zend_long cipherid = PHP_OPENSSL_CIPHER_DEFAULT;
- zend_string * strindex;
- char * infilename = NULL;
- size_t infilename_len;
- char * outfilename = NULL;
- size_t outfilename_len;
- RETVAL_FALSE;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ppza!|ll", &infilename, &infilename_len,
- &outfilename, &outfilename_len, &zrecipcerts, &zheaders, &flags, &cipherid) == FAILURE)
- return;
- if (php_openssl_open_base_dir_chk(infilename) || php_openssl_open_base_dir_chk(outfilename)) {
- return;
- }
- infile = BIO_new_file(infilename, PHP_OPENSSL_BIO_MODE_R(flags));
- if (infile == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- outfile = BIO_new_file(outfilename, PHP_OPENSSL_BIO_MODE_W(flags));
- if (outfile == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- recipcerts = sk_X509_new_null();
-
- if (Z_TYPE_P(zrecipcerts) == IS_ARRAY) {
- ZEND_HASH_FOREACH_VAL(Z_ARRVAL_P(zrecipcerts), zcertval) {
- zend_resource *certresource;
- cert = php_openssl_x509_from_zval(zcertval, 0, &certresource);
- if (cert == NULL) {
- goto clean_exit;
- }
- if (certresource != NULL) {
-
- cert = X509_dup(cert);
- if (cert == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- }
- sk_X509_push(recipcerts, cert);
- } ZEND_HASH_FOREACH_END();
- } else {
-
- zend_resource *certresource;
- cert = php_openssl_x509_from_zval(zrecipcerts, 0, &certresource);
- if (cert == NULL) {
- goto clean_exit;
- }
- if (certresource != NULL) {
-
- cert = X509_dup(cert);
- if (cert == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- }
- sk_X509_push(recipcerts, cert);
- }
-
- cipher = php_openssl_get_evp_cipher_from_algo(cipherid);
- if (cipher == NULL) {
-
- php_error_docref(NULL, E_WARNING, "Failed to get cipher");
- goto clean_exit;
- }
- p7 = PKCS7_encrypt(recipcerts, infile, (EVP_CIPHER*)cipher, (int)flags);
- if (p7 == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
-
- if (zheaders) {
- ZEND_HASH_FOREACH_STR_KEY_VAL(Z_ARRVAL_P(zheaders), strindex, zcertval) {
- convert_to_string_ex(zcertval);
- if (strindex) {
- BIO_printf(outfile, "%s: %s\n", ZSTR_VAL(strindex), Z_STRVAL_P(zcertval));
- } else {
- BIO_printf(outfile, "%s\n", Z_STRVAL_P(zcertval));
- }
- } ZEND_HASH_FOREACH_END();
- }
- (void)BIO_reset(infile);
-
- if (!SMIME_write_PKCS7(outfile, p7, infile, (int)flags)) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- RETVAL_TRUE;
- clean_exit:
- PKCS7_free(p7);
- BIO_free(infile);
- BIO_free(outfile);
- if (recipcerts) {
- sk_X509_pop_free(recipcerts, X509_free);
- }
- }
- PHP_FUNCTION(openssl_pkcs7_read)
- {
- zval * zout = NULL, zcert;
- char *p7b;
- size_t p7b_len;
- STACK_OF(X509) *certs = NULL;
- STACK_OF(X509_CRL) *crls = NULL;
- BIO * bio_in = NULL, * bio_out = NULL;
- PKCS7 * p7 = NULL;
- int i;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sz/", &p7b, &p7b_len,
- &zout) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(p7b_len, p7b);
- bio_in = BIO_new(BIO_s_mem());
- if (bio_in == NULL) {
- goto clean_exit;
- }
- if (0 >= BIO_write(bio_in, p7b, (int)p7b_len)) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- p7 = PEM_read_bio_PKCS7(bio_in, NULL, NULL, NULL);
- if (p7 == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- switch (OBJ_obj2nid(p7->type)) {
- case NID_pkcs7_signed:
- if (p7->d.sign != NULL) {
- certs = p7->d.sign->cert;
- crls = p7->d.sign->crl;
- }
- break;
- case NID_pkcs7_signedAndEnveloped:
- if (p7->d.signed_and_enveloped != NULL) {
- certs = p7->d.signed_and_enveloped->cert;
- crls = p7->d.signed_and_enveloped->crl;
- }
- break;
- default:
- break;
- }
- zval_ptr_dtor(zout);
- array_init(zout);
- if (certs != NULL) {
- for (i = 0; i < sk_X509_num(certs); i++) {
- X509* ca = sk_X509_value(certs, i);
- bio_out = BIO_new(BIO_s_mem());
- if (bio_out && PEM_write_bio_X509(bio_out, ca)) {
- BUF_MEM *bio_buf;
- BIO_get_mem_ptr(bio_out, &bio_buf);
- ZVAL_STRINGL(&zcert, bio_buf->data, bio_buf->length);
- add_index_zval(zout, i, &zcert);
- BIO_free(bio_out);
- }
- }
- }
- if (crls != NULL) {
- for (i = 0; i < sk_X509_CRL_num(crls); i++) {
- X509_CRL* crl = sk_X509_CRL_value(crls, i);
- bio_out = BIO_new(BIO_s_mem());
- if (bio_out && PEM_write_bio_X509_CRL(bio_out, crl)) {
- BUF_MEM *bio_buf;
- BIO_get_mem_ptr(bio_out, &bio_buf);
- ZVAL_STRINGL(&zcert, bio_buf->data, bio_buf->length);
- add_index_zval(zout, i, &zcert);
- BIO_free(bio_out);
- }
- }
- }
- RETVAL_TRUE;
- clean_exit:
- if (bio_in != NULL) {
- BIO_free(bio_in);
- }
- if (p7 != NULL) {
- PKCS7_free(p7);
- }
- }
- PHP_FUNCTION(openssl_pkcs7_sign)
- {
- zval * zcert, * zprivkey, * zheaders;
- zval * hval;
- X509 * cert = NULL;
- EVP_PKEY * privkey = NULL;
- zend_long flags = PKCS7_DETACHED;
- PKCS7 * p7 = NULL;
- BIO * infile = NULL, * outfile = NULL;
- STACK_OF(X509) *others = NULL;
- zend_resource *certresource = NULL, *keyresource = NULL;
- zend_string * strindex;
- char * infilename;
- size_t infilename_len;
- char * outfilename;
- size_t outfilename_len;
- char * extracertsfilename = NULL;
- size_t extracertsfilename_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ppzza!|lp!",
- &infilename, &infilename_len, &outfilename, &outfilename_len,
- &zcert, &zprivkey, &zheaders, &flags, &extracertsfilename,
- &extracertsfilename_len) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- if (extracertsfilename) {
- others = php_openssl_load_all_certs_from_file(extracertsfilename);
- if (others == NULL) {
- goto clean_exit;
- }
- }
- privkey = php_openssl_evp_from_zval(zprivkey, 0, "", 0, 0, &keyresource);
- if (privkey == NULL) {
- php_error_docref(NULL, E_WARNING, "error getting private key");
- goto clean_exit;
- }
- cert = php_openssl_x509_from_zval(zcert, 0, &certresource);
- if (cert == NULL) {
- php_error_docref(NULL, E_WARNING, "error getting cert");
- goto clean_exit;
- }
- if (php_openssl_open_base_dir_chk(infilename) || php_openssl_open_base_dir_chk(outfilename)) {
- goto clean_exit;
- }
- infile = BIO_new_file(infilename, PHP_OPENSSL_BIO_MODE_R(flags));
- if (infile == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "error opening input file %s!", infilename);
- goto clean_exit;
- }
- outfile = BIO_new_file(outfilename, PHP_OPENSSL_BIO_MODE_W(PKCS7_BINARY));
- if (outfile == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "error opening output file %s!", outfilename);
- goto clean_exit;
- }
- p7 = PKCS7_sign(cert, privkey, others, infile, (int)flags);
- if (p7 == NULL) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "error creating PKCS7 structure!");
- goto clean_exit;
- }
- (void)BIO_reset(infile);
-
- if (zheaders) {
- int ret;
- ZEND_HASH_FOREACH_STR_KEY_VAL(Z_ARRVAL_P(zheaders), strindex, hval) {
- convert_to_string_ex(hval);
- if (strindex) {
- ret = BIO_printf(outfile, "%s: %s\n", ZSTR_VAL(strindex), Z_STRVAL_P(hval));
- } else {
- ret = BIO_printf(outfile, "%s\n", Z_STRVAL_P(hval));
- }
- if (ret < 0) {
- php_openssl_store_errors();
- }
- } ZEND_HASH_FOREACH_END();
- }
-
- if (!SMIME_write_PKCS7(outfile, p7, infile, (int)flags)) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- RETVAL_TRUE;
- clean_exit:
- PKCS7_free(p7);
- BIO_free(infile);
- BIO_free(outfile);
- if (others) {
- sk_X509_pop_free(others, X509_free);
- }
- if (privkey && keyresource == NULL) {
- EVP_PKEY_free(privkey);
- }
- if (cert && certresource == NULL) {
- X509_free(cert);
- }
- }
- PHP_FUNCTION(openssl_pkcs7_decrypt)
- {
- zval * recipcert, * recipkey = NULL;
- X509 * cert = NULL;
- EVP_PKEY * key = NULL;
- zend_resource *certresval, *keyresval;
- BIO * in = NULL, * out = NULL, * datain = NULL;
- PKCS7 * p7 = NULL;
- char * infilename;
- size_t infilename_len;
- char * outfilename;
- size_t outfilename_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ppz|z", &infilename, &infilename_len,
- &outfilename, &outfilename_len, &recipcert, &recipkey) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- cert = php_openssl_x509_from_zval(recipcert, 0, &certresval);
- if (cert == NULL) {
- php_error_docref(NULL, E_WARNING, "unable to coerce parameter 3 to x509 cert");
- goto clean_exit;
- }
- key = php_openssl_evp_from_zval(recipkey ? recipkey : recipcert, 0, "", 0, 0, &keyresval);
- if (key == NULL) {
- php_error_docref(NULL, E_WARNING, "unable to get private key");
- goto clean_exit;
- }
- if (php_openssl_open_base_dir_chk(infilename) || php_openssl_open_base_dir_chk(outfilename)) {
- goto clean_exit;
- }
- in = BIO_new_file(infilename, PHP_OPENSSL_BIO_MODE_R(PKCS7_BINARY));
- if (in == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- out = BIO_new_file(outfilename, PHP_OPENSSL_BIO_MODE_W(PKCS7_BINARY));
- if (out == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- p7 = SMIME_read_PKCS7(in, &datain);
- if (p7 == NULL) {
- php_openssl_store_errors();
- goto clean_exit;
- }
- if (PKCS7_decrypt(p7, key, cert, out, PKCS7_DETACHED)) {
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- }
- clean_exit:
- PKCS7_free(p7);
- BIO_free(datain);
- BIO_free(in);
- BIO_free(out);
- if (cert && certresval == NULL) {
- X509_free(cert);
- }
- if (key && keyresval == NULL) {
- EVP_PKEY_free(key);
- }
- }
- PHP_FUNCTION(openssl_private_encrypt)
- {
- zval *key, *crypted;
- EVP_PKEY *pkey;
- int cryptedlen;
- zend_string *cryptedbuf = NULL;
- int successful = 0;
- zend_resource *keyresource = NULL;
- char * data;
- size_t data_len;
- zend_long padding = RSA_PKCS1_PADDING;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sz/z|l", &data, &data_len, &crypted, &key, &padding) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- pkey = php_openssl_evp_from_zval(key, 0, "", 0, 0, &keyresource);
- if (pkey == NULL) {
- php_error_docref(NULL, E_WARNING, "key param is not a valid private key");
- RETURN_FALSE;
- }
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(data_len, data);
- cryptedlen = EVP_PKEY_size(pkey);
- cryptedbuf = zend_string_alloc(cryptedlen, 0);
- switch (EVP_PKEY_id(pkey)) {
- case EVP_PKEY_RSA:
- case EVP_PKEY_RSA2:
- successful = (RSA_private_encrypt((int)data_len,
- (unsigned char *)data,
- (unsigned char *)ZSTR_VAL(cryptedbuf),
- EVP_PKEY_get0_RSA(pkey),
- (int)padding) == cryptedlen);
- break;
- default:
- php_error_docref(NULL, E_WARNING, "key type not supported in this PHP build!");
- }
- if (successful) {
- zval_ptr_dtor(crypted);
- ZSTR_VAL(cryptedbuf)[cryptedlen] = '\0';
- ZVAL_NEW_STR(crypted, cryptedbuf);
- cryptedbuf = NULL;
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- }
- if (cryptedbuf) {
- zend_string_release_ex(cryptedbuf, 0);
- }
- if (keyresource == NULL) {
- EVP_PKEY_free(pkey);
- }
- }
- PHP_FUNCTION(openssl_private_decrypt)
- {
- zval *key, *crypted;
- EVP_PKEY *pkey;
- int cryptedlen;
- zend_string *cryptedbuf = NULL;
- unsigned char *crypttemp;
- int successful = 0;
- zend_long padding = RSA_PKCS1_PADDING;
- zend_resource *keyresource = NULL;
- char * data;
- size_t data_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sz/z|l", &data, &data_len, &crypted, &key, &padding) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- pkey = php_openssl_evp_from_zval(key, 0, "", 0, 0, &keyresource);
- if (pkey == NULL) {
- php_error_docref(NULL, E_WARNING, "key parameter is not a valid private key");
- RETURN_FALSE;
- }
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(data_len, data);
- cryptedlen = EVP_PKEY_size(pkey);
- crypttemp = emalloc(cryptedlen + 1);
- switch (EVP_PKEY_id(pkey)) {
- case EVP_PKEY_RSA:
- case EVP_PKEY_RSA2:
- cryptedlen = RSA_private_decrypt((int)data_len,
- (unsigned char *)data,
- crypttemp,
- EVP_PKEY_get0_RSA(pkey),
- (int)padding);
- if (cryptedlen != -1) {
- cryptedbuf = zend_string_alloc(cryptedlen, 0);
- memcpy(ZSTR_VAL(cryptedbuf), crypttemp, cryptedlen);
- successful = 1;
- }
- break;
- default:
- php_error_docref(NULL, E_WARNING, "key type not supported in this PHP build!");
- }
- efree(crypttemp);
- if (successful) {
- zval_ptr_dtor(crypted);
- ZSTR_VAL(cryptedbuf)[cryptedlen] = '\0';
- ZVAL_NEW_STR(crypted, cryptedbuf);
- cryptedbuf = NULL;
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- }
- if (keyresource == NULL) {
- EVP_PKEY_free(pkey);
- }
- if (cryptedbuf) {
- zend_string_release_ex(cryptedbuf, 0);
- }
- }
- PHP_FUNCTION(openssl_public_encrypt)
- {
- zval *key, *crypted;
- EVP_PKEY *pkey;
- int cryptedlen;
- zend_string *cryptedbuf;
- int successful = 0;
- zend_resource *keyresource = NULL;
- zend_long padding = RSA_PKCS1_PADDING;
- char * data;
- size_t data_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sz/z|l", &data, &data_len, &crypted, &key, &padding) == FAILURE)
- return;
- RETVAL_FALSE;
- pkey = php_openssl_evp_from_zval(key, 1, NULL, 0, 0, &keyresource);
- if (pkey == NULL) {
- php_error_docref(NULL, E_WARNING, "key parameter is not a valid public key");
- RETURN_FALSE;
- }
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(data_len, data);
- cryptedlen = EVP_PKEY_size(pkey);
- cryptedbuf = zend_string_alloc(cryptedlen, 0);
- switch (EVP_PKEY_id(pkey)) {
- case EVP_PKEY_RSA:
- case EVP_PKEY_RSA2:
- successful = (RSA_public_encrypt((int)data_len,
- (unsigned char *)data,
- (unsigned char *)ZSTR_VAL(cryptedbuf),
- EVP_PKEY_get0_RSA(pkey),
- (int)padding) == cryptedlen);
- break;
- default:
- php_error_docref(NULL, E_WARNING, "key type not supported in this PHP build!");
- }
- if (successful) {
- zval_ptr_dtor(crypted);
- ZSTR_VAL(cryptedbuf)[cryptedlen] = '\0';
- ZVAL_NEW_STR(crypted, cryptedbuf);
- cryptedbuf = NULL;
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- }
- if (keyresource == NULL) {
- EVP_PKEY_free(pkey);
- }
- if (cryptedbuf) {
- zend_string_release_ex(cryptedbuf, 0);
- }
- }
- PHP_FUNCTION(openssl_public_decrypt)
- {
- zval *key, *crypted;
- EVP_PKEY *pkey;
- int cryptedlen;
- zend_string *cryptedbuf = NULL;
- unsigned char *crypttemp;
- int successful = 0;
- zend_resource *keyresource = NULL;
- zend_long padding = RSA_PKCS1_PADDING;
- char * data;
- size_t data_len;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sz/z|l", &data, &data_len, &crypted, &key, &padding) == FAILURE) {
- return;
- }
- RETVAL_FALSE;
- pkey = php_openssl_evp_from_zval(key, 1, NULL, 0, 0, &keyresource);
- if (pkey == NULL) {
- php_error_docref(NULL, E_WARNING, "key parameter is not a valid public key");
- RETURN_FALSE;
- }
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(data_len, data);
- cryptedlen = EVP_PKEY_size(pkey);
- crypttemp = emalloc(cryptedlen + 1);
- switch (EVP_PKEY_id(pkey)) {
- case EVP_PKEY_RSA:
- case EVP_PKEY_RSA2:
- cryptedlen = RSA_public_decrypt((int)data_len,
- (unsigned char *)data,
- crypttemp,
- EVP_PKEY_get0_RSA(pkey),
- (int)padding);
- if (cryptedlen != -1) {
- cryptedbuf = zend_string_alloc(cryptedlen, 0);
- memcpy(ZSTR_VAL(cryptedbuf), crypttemp, cryptedlen);
- successful = 1;
- }
- break;
- default:
- php_error_docref(NULL, E_WARNING, "key type not supported in this PHP build!");
- }
- efree(crypttemp);
- if (successful) {
- zval_ptr_dtor(crypted);
- ZSTR_VAL(cryptedbuf)[cryptedlen] = '\0';
- ZVAL_NEW_STR(crypted, cryptedbuf);
- cryptedbuf = NULL;
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- }
- if (cryptedbuf) {
- zend_string_release_ex(cryptedbuf, 0);
- }
- if (keyresource == NULL) {
- EVP_PKEY_free(pkey);
- }
- }
- PHP_FUNCTION(openssl_error_string)
- {
- char buf[256];
- unsigned long val;
- if (zend_parse_parameters_none() == FAILURE) {
- return;
- }
- php_openssl_store_errors();
- if (OPENSSL_G(errors) == NULL || OPENSSL_G(errors)->top == OPENSSL_G(errors)->bottom) {
- RETURN_FALSE;
- }
- OPENSSL_G(errors)->bottom = (OPENSSL_G(errors)->bottom + 1) % ERR_NUM_ERRORS;
- val = OPENSSL_G(errors)->buffer[OPENSSL_G(errors)->bottom];
- if (val) {
- ERR_error_string_n(val, buf, 256);
- RETURN_STRING(buf);
- } else {
- RETURN_FALSE;
- }
- }
- PHP_FUNCTION(openssl_sign)
- {
- zval *key, *signature;
- EVP_PKEY *pkey;
- unsigned int siglen;
- zend_string *sigbuf;
- zend_resource *keyresource = NULL;
- char * data;
- size_t data_len;
- EVP_MD_CTX *md_ctx;
- zval *method = NULL;
- zend_long signature_algo = OPENSSL_ALGO_SHA1;
- const EVP_MD *mdtype;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sz/z|z", &data, &data_len, &signature, &key, &method) == FAILURE) {
- return;
- }
- pkey = php_openssl_evp_from_zval(key, 0, "", 0, 0, &keyresource);
- if (pkey == NULL) {
- php_error_docref(NULL, E_WARNING, "supplied key param cannot be coerced into a private key");
- RETURN_FALSE;
- }
- if (method == NULL || Z_TYPE_P(method) == IS_LONG) {
- if (method != NULL) {
- signature_algo = Z_LVAL_P(method);
- }
- mdtype = php_openssl_get_evp_md_from_algo(signature_algo);
- } else if (Z_TYPE_P(method) == IS_STRING) {
- mdtype = EVP_get_digestbyname(Z_STRVAL_P(method));
- } else {
- php_error_docref(NULL, E_WARNING, "Unknown signature algorithm.");
- RETURN_FALSE;
- }
- if (!mdtype) {
- php_error_docref(NULL, E_WARNING, "Unknown signature algorithm.");
- RETURN_FALSE;
- }
- siglen = EVP_PKEY_size(pkey);
- sigbuf = zend_string_alloc(siglen, 0);
- md_ctx = EVP_MD_CTX_create();
- if (md_ctx != NULL &&
- EVP_SignInit(md_ctx, mdtype) &&
- EVP_SignUpdate(md_ctx, data, data_len) &&
- EVP_SignFinal(md_ctx, (unsigned char*)ZSTR_VAL(sigbuf), &siglen, pkey)) {
- zval_ptr_dtor(signature);
- ZSTR_VAL(sigbuf)[siglen] = '\0';
- ZSTR_LEN(sigbuf) = siglen;
- ZVAL_NEW_STR(signature, sigbuf);
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- efree(sigbuf);
- RETVAL_FALSE;
- }
- EVP_MD_CTX_destroy(md_ctx);
- if (keyresource == NULL) {
- EVP_PKEY_free(pkey);
- }
- }
- PHP_FUNCTION(openssl_verify)
- {
- zval *key;
- EVP_PKEY *pkey;
- int err = 0;
- EVP_MD_CTX *md_ctx;
- const EVP_MD *mdtype;
- zend_resource *keyresource = NULL;
- char * data;
- size_t data_len;
- char * signature;
- size_t signature_len;
- zval *method = NULL;
- zend_long signature_algo = OPENSSL_ALGO_SHA1;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ssz|z", &data, &data_len, &signature, &signature_len, &key, &method) == FAILURE) {
- return;
- }
- PHP_OPENSSL_CHECK_SIZE_T_TO_UINT(signature_len, signature);
- if (method == NULL || Z_TYPE_P(method) == IS_LONG) {
- if (method != NULL) {
- signature_algo = Z_LVAL_P(method);
- }
- mdtype = php_openssl_get_evp_md_from_algo(signature_algo);
- } else if (Z_TYPE_P(method) == IS_STRING) {
- mdtype = EVP_get_digestbyname(Z_STRVAL_P(method));
- } else {
- php_error_docref(NULL, E_WARNING, "Unknown signature algorithm.");
- RETURN_FALSE;
- }
- if (!mdtype) {
- php_error_docref(NULL, E_WARNING, "Unknown signature algorithm.");
- RETURN_FALSE;
- }
- pkey = php_openssl_evp_from_zval(key, 1, NULL, 0, 0, &keyresource);
- if (pkey == NULL) {
- php_error_docref(NULL, E_WARNING, "supplied key param cannot be coerced into a public key");
- RETURN_FALSE;
- }
- md_ctx = EVP_MD_CTX_create();
- if (md_ctx == NULL ||
- !EVP_VerifyInit (md_ctx, mdtype) ||
- !EVP_VerifyUpdate (md_ctx, data, data_len) ||
- (err = EVP_VerifyFinal(md_ctx, (unsigned char *)signature, (unsigned int)signature_len, pkey)) < 0) {
- php_openssl_store_errors();
- }
- EVP_MD_CTX_destroy(md_ctx);
- if (keyresource == NULL) {
- EVP_PKEY_free(pkey);
- }
- RETURN_LONG(err);
- }
- PHP_FUNCTION(openssl_seal)
- {
- zval *pubkeys, *pubkey, *sealdata, *ekeys, *iv = NULL;
- HashTable *pubkeysht;
- EVP_PKEY **pkeys;
- zend_resource ** key_resources;
- int i, len1, len2, *eksl, nkeys, iv_len;
- unsigned char iv_buf[EVP_MAX_IV_LENGTH + 1], *buf = NULL, **eks;
- char * data;
- size_t data_len;
- char *method =NULL;
- size_t method_len = 0;
- const EVP_CIPHER *cipher;
- EVP_CIPHER_CTX *ctx;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sz/z/a|sz/", &data, &data_len,
- &sealdata, &ekeys, &pubkeys, &method, &method_len, &iv) == FAILURE) {
- return;
- }
- pubkeysht = Z_ARRVAL_P(pubkeys);
- nkeys = pubkeysht ? zend_hash_num_elements(pubkeysht) : 0;
- if (!nkeys) {
- php_error_docref(NULL, E_WARNING, "Fourth argument to openssl_seal() must be a non-empty array");
- RETURN_FALSE;
- }
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(data_len, data);
- if (method) {
- cipher = EVP_get_cipherbyname(method);
- if (!cipher) {
- php_error_docref(NULL, E_WARNING, "Unknown signature algorithm.");
- RETURN_FALSE;
- }
- } else {
- cipher = EVP_rc4();
- }
- iv_len = EVP_CIPHER_iv_length(cipher);
- if (!iv && iv_len > 0) {
- php_error_docref(NULL, E_WARNING,
- "Cipher algorithm requires an IV to be supplied as a sixth parameter");
- RETURN_FALSE;
- }
- pkeys = safe_emalloc(nkeys, sizeof(*pkeys), 0);
- eksl = safe_emalloc(nkeys, sizeof(*eksl), 0);
- eks = safe_emalloc(nkeys, sizeof(*eks), 0);
- memset(eks, 0, sizeof(*eks) * nkeys);
- key_resources = safe_emalloc(nkeys, sizeof(zend_resource*), 0);
- memset(key_resources, 0, sizeof(zend_resource*) * nkeys);
- memset(pkeys, 0, sizeof(*pkeys) * nkeys);
-
- i = 0;
- ZEND_HASH_FOREACH_VAL(pubkeysht, pubkey) {
- pkeys[i] = php_openssl_evp_from_zval(pubkey, 1, NULL, 0, 0, &key_resources[i]);
- if (pkeys[i] == NULL) {
- php_error_docref(NULL, E_WARNING, "not a public key (%dth member of pubkeys)", i+1);
- RETVAL_FALSE;
- goto clean_exit;
- }
- eks[i] = emalloc(EVP_PKEY_size(pkeys[i]) + 1);
- i++;
- } ZEND_HASH_FOREACH_END();
- ctx = EVP_CIPHER_CTX_new();
- if (ctx == NULL || !EVP_EncryptInit(ctx,cipher,NULL,NULL)) {
- EVP_CIPHER_CTX_free(ctx);
- php_openssl_store_errors();
- RETVAL_FALSE;
- goto clean_exit;
- }
-
- buf = emalloc(data_len + EVP_CIPHER_CTX_block_size(ctx));
- EVP_CIPHER_CTX_cleanup(ctx);
- if (EVP_SealInit(ctx, cipher, eks, eksl, &iv_buf[0], pkeys, nkeys) <= 0 ||
- !EVP_SealUpdate(ctx, buf, &len1, (unsigned char *)data, (int)data_len) ||
- !EVP_SealFinal(ctx, buf + len1, &len2)) {
- efree(buf);
- EVP_CIPHER_CTX_free(ctx);
- php_openssl_store_errors();
- RETVAL_FALSE;
- goto clean_exit;
- }
- if (len1 + len2 > 0) {
- zval_ptr_dtor(sealdata);
- ZVAL_NEW_STR(sealdata, zend_string_init((char*)buf, len1 + len2, 0));
- efree(buf);
- zval_ptr_dtor(ekeys);
- array_init(ekeys);
- for (i=0; i<nkeys; i++) {
- eks[i][eksl[i]] = '\0';
- add_next_index_stringl(ekeys, (const char*)eks[i], eksl[i]);
- efree(eks[i]);
- eks[i] = NULL;
- }
- if (iv) {
- zval_ptr_dtor(iv);
- iv_buf[iv_len] = '\0';
- ZVAL_NEW_STR(iv, zend_string_init((char*)iv_buf, iv_len, 0));
- }
- } else {
- efree(buf);
- }
- RETVAL_LONG(len1 + len2);
- EVP_CIPHER_CTX_free(ctx);
- clean_exit:
- for (i=0; i<nkeys; i++) {
- if (key_resources[i] == NULL && pkeys[i] != NULL) {
- EVP_PKEY_free(pkeys[i]);
- }
- if (eks[i]) {
- efree(eks[i]);
- }
- }
- efree(eks);
- efree(eksl);
- efree(pkeys);
- efree(key_resources);
- }
- PHP_FUNCTION(openssl_open)
- {
- zval *privkey, *opendata;
- EVP_PKEY *pkey;
- int len1, len2, cipher_iv_len;
- unsigned char *buf, *iv_buf;
- zend_resource *keyresource = NULL;
- EVP_CIPHER_CTX *ctx;
- char * data;
- size_t data_len;
- char * ekey;
- size_t ekey_len;
- char *method = NULL, *iv = NULL;
- size_t method_len = 0, iv_len = 0;
- const EVP_CIPHER *cipher;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sz/sz|ss", &data, &data_len, &opendata,
- &ekey, &ekey_len, &privkey, &method, &method_len, &iv, &iv_len) == FAILURE) {
- return;
- }
- pkey = php_openssl_evp_from_zval(privkey, 0, "", 0, 0, &keyresource);
- if (pkey == NULL) {
- php_error_docref(NULL, E_WARNING, "unable to coerce parameter 4 into a private key");
- RETURN_FALSE;
- }
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(ekey_len, ekey);
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(data_len, data);
- if (method) {
- cipher = EVP_get_cipherbyname(method);
- if (!cipher) {
- php_error_docref(NULL, E_WARNING, "Unknown signature algorithm.");
- RETURN_FALSE;
- }
- } else {
- cipher = EVP_rc4();
- }
- cipher_iv_len = EVP_CIPHER_iv_length(cipher);
- if (cipher_iv_len > 0) {
- if (!iv) {
- php_error_docref(NULL, E_WARNING,
- "Cipher algorithm requires an IV to be supplied as a sixth parameter");
- RETURN_FALSE;
- }
- if ((size_t)cipher_iv_len != iv_len) {
- php_error_docref(NULL, E_WARNING, "IV length is invalid");
- RETURN_FALSE;
- }
- iv_buf = (unsigned char *)iv;
- } else {
- iv_buf = NULL;
- }
- buf = emalloc(data_len + 1);
- ctx = EVP_CIPHER_CTX_new();
- if (ctx != NULL && EVP_OpenInit(ctx, cipher, (unsigned char *)ekey, (int)ekey_len, iv_buf, pkey) &&
- EVP_OpenUpdate(ctx, buf, &len1, (unsigned char *)data, (int)data_len) &&
- EVP_OpenFinal(ctx, buf + len1, &len2) && (len1 + len2 > 0)) {
- zval_ptr_dtor(opendata);
- buf[len1 + len2] = '\0';
- ZVAL_NEW_STR(opendata, zend_string_init((char*)buf, len1 + len2, 0));
- RETVAL_TRUE;
- } else {
- php_openssl_store_errors();
- RETVAL_FALSE;
- }
- efree(buf);
- if (keyresource == NULL) {
- EVP_PKEY_free(pkey);
- }
- EVP_CIPHER_CTX_free(ctx);
- }
- static void php_openssl_add_method_or_alias(const OBJ_NAME *name, void *arg)
- {
- add_next_index_string((zval*)arg, (char*)name->name);
- }
- static void php_openssl_add_method(const OBJ_NAME *name, void *arg)
- {
- if (name->alias == 0) {
- add_next_index_string((zval*)arg, (char*)name->name);
- }
- }
- PHP_FUNCTION(openssl_get_md_methods)
- {
- zend_bool aliases = 0;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "|b", &aliases) == FAILURE) {
- return;
- }
- array_init(return_value);
- OBJ_NAME_do_all_sorted(OBJ_NAME_TYPE_MD_METH,
- aliases ? php_openssl_add_method_or_alias: php_openssl_add_method,
- return_value);
- }
- PHP_FUNCTION(openssl_get_cipher_methods)
- {
- zend_bool aliases = 0;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "|b", &aliases) == FAILURE) {
- return;
- }
- array_init(return_value);
- OBJ_NAME_do_all_sorted(OBJ_NAME_TYPE_CIPHER_METH,
- aliases ? php_openssl_add_method_or_alias: php_openssl_add_method,
- return_value);
- }
- #ifdef HAVE_EVP_PKEY_EC
- PHP_FUNCTION(openssl_get_curve_names)
- {
- EC_builtin_curve *curves = NULL;
- const char *sname;
- size_t i;
- size_t len = EC_get_builtin_curves(NULL, 0);
- curves = emalloc(sizeof(EC_builtin_curve) * len);
- if (!EC_get_builtin_curves(curves, len)) {
- RETURN_FALSE;
- }
- array_init(return_value);
- for (i = 0; i < len; i++) {
- sname = OBJ_nid2sn(curves[i].nid);
- if (sname != NULL) {
- add_next_index_string(return_value, sname);
- }
- }
- efree(curves);
- }
- #endif
- PHP_FUNCTION(openssl_digest)
- {
- zend_bool raw_output = 0;
- char *data, *method;
- size_t data_len, method_len;
- const EVP_MD *mdtype;
- EVP_MD_CTX *md_ctx;
- unsigned int siglen;
- zend_string *sigbuf;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "ss|b", &data, &data_len, &method, &method_len, &raw_output) == FAILURE) {
- return;
- }
- mdtype = EVP_get_digestbyname(method);
- if (!mdtype) {
- php_error_docref(NULL, E_WARNING, "Unknown signature algorithm");
- RETURN_FALSE;
- }
- siglen = EVP_MD_size(mdtype);
- sigbuf = zend_string_alloc(siglen, 0);
- md_ctx = EVP_MD_CTX_create();
- if (EVP_DigestInit(md_ctx, mdtype) &&
- EVP_DigestUpdate(md_ctx, (unsigned char *)data, data_len) &&
- EVP_DigestFinal (md_ctx, (unsigned char *)ZSTR_VAL(sigbuf), &siglen)) {
- if (raw_output) {
- ZSTR_VAL(sigbuf)[siglen] = '\0';
- ZSTR_LEN(sigbuf) = siglen;
- RETVAL_STR(sigbuf);
- } else {
- int digest_str_len = siglen * 2;
- zend_string *digest_str = zend_string_alloc(digest_str_len, 0);
- make_digest_ex(ZSTR_VAL(digest_str), (unsigned char*)ZSTR_VAL(sigbuf), siglen);
- ZSTR_VAL(digest_str)[digest_str_len] = '\0';
- zend_string_release_ex(sigbuf, 0);
- RETVAL_NEW_STR(digest_str);
- }
- } else {
- php_openssl_store_errors();
- zend_string_release_ex(sigbuf, 0);
- RETVAL_FALSE;
- }
- EVP_MD_CTX_destroy(md_ctx);
- }
- struct php_openssl_cipher_mode {
- zend_bool is_aead;
- zend_bool is_single_run_aead;
- int aead_get_tag_flag;
- int aead_set_tag_flag;
- int aead_ivlen_flag;
- };
- static void php_openssl_load_cipher_mode(struct php_openssl_cipher_mode *mode, const EVP_CIPHER *cipher_type)
- {
- switch (EVP_CIPHER_mode(cipher_type)) {
- #ifdef EVP_CIPH_GCM_MODE
- case EVP_CIPH_GCM_MODE:
- mode->is_aead = 1;
- mode->is_single_run_aead = 0;
- mode->aead_get_tag_flag = EVP_CTRL_GCM_GET_TAG;
- mode->aead_set_tag_flag = EVP_CTRL_GCM_SET_TAG;
- mode->aead_ivlen_flag = EVP_CTRL_GCM_SET_IVLEN;
- break;
- #endif
- #ifdef EVP_CIPH_CCM_MODE
- case EVP_CIPH_CCM_MODE:
- mode->is_aead = 1;
- mode->is_single_run_aead = 1;
- mode->aead_get_tag_flag = EVP_CTRL_CCM_GET_TAG;
- mode->aead_set_tag_flag = EVP_CTRL_CCM_SET_TAG;
- mode->aead_ivlen_flag = EVP_CTRL_CCM_SET_IVLEN;
- break;
- #endif
- default:
- memset(mode, 0, sizeof(struct php_openssl_cipher_mode));
- }
- }
- static int php_openssl_validate_iv(char **piv, size_t *piv_len, size_t iv_required_len,
- zend_bool *free_iv, EVP_CIPHER_CTX *cipher_ctx, struct php_openssl_cipher_mode *mode)
- {
- char *iv_new;
- if (mode->is_aead) {
- if (EVP_CIPHER_CTX_ctrl(cipher_ctx, mode->aead_ivlen_flag, *piv_len, NULL) != 1) {
- php_error_docref(NULL, E_WARNING, "Setting of IV length for AEAD mode failed");
- return FAILURE;
- }
- return SUCCESS;
- }
-
- if (*piv_len == iv_required_len) {
- return SUCCESS;
- }
- iv_new = ecalloc(1, iv_required_len + 1);
- if (*piv_len == 0) {
-
- *piv_len = iv_required_len;
- *piv = iv_new;
- *free_iv = 1;
- return SUCCESS;
- }
- if (*piv_len < iv_required_len) {
- php_error_docref(NULL, E_WARNING,
- "IV passed is only %zd bytes long, cipher expects an IV of precisely %zd bytes, padding with \\0",
- *piv_len, iv_required_len);
- memcpy(iv_new, *piv, *piv_len);
- *piv_len = iv_required_len;
- *piv = iv_new;
- *free_iv = 1;
- return SUCCESS;
- }
- php_error_docref(NULL, E_WARNING,
- "IV passed is %zd bytes long which is longer than the %zd expected by selected cipher, truncating",
- *piv_len, iv_required_len);
- memcpy(iv_new, *piv, iv_required_len);
- *piv_len = iv_required_len;
- *piv = iv_new;
- *free_iv = 1;
- return SUCCESS;
- }
- static int php_openssl_cipher_init(const EVP_CIPHER *cipher_type,
- EVP_CIPHER_CTX *cipher_ctx, struct php_openssl_cipher_mode *mode,
- char **ppassword, size_t *ppassword_len, zend_bool *free_password,
- char **piv, size_t *piv_len, zend_bool *free_iv,
- char *tag, int tag_len, zend_long options, int enc)
- {
- unsigned char *key;
- int key_len, password_len;
- size_t max_iv_len;
- *free_password = 0;
- max_iv_len = EVP_CIPHER_iv_length(cipher_type);
- if (enc && *piv_len == 0 && max_iv_len > 0 && !mode->is_aead) {
- php_error_docref(NULL, E_WARNING,
- "Using an empty Initialization Vector (iv) is potentially insecure and not recommended");
- }
- if (!EVP_CipherInit_ex(cipher_ctx, cipher_type, NULL, NULL, NULL, enc)) {
- php_openssl_store_errors();
- return FAILURE;
- }
- if (php_openssl_validate_iv(piv, piv_len, max_iv_len, free_iv, cipher_ctx, mode) == FAILURE) {
- return FAILURE;
- }
- if (mode->is_single_run_aead && enc) {
- if (!EVP_CIPHER_CTX_ctrl(cipher_ctx, mode->aead_set_tag_flag, tag_len, NULL)) {
- php_error_docref(NULL, E_WARNING, "Setting tag length for AEAD cipher failed");
- return FAILURE;
- }
- } else if (!enc && tag && tag_len > 0) {
- if (!mode->is_aead) {
- php_error_docref(NULL, E_WARNING, "The tag cannot be used because the cipher method does not support AEAD");
- } else if (!EVP_CIPHER_CTX_ctrl(cipher_ctx, mode->aead_set_tag_flag, tag_len, (unsigned char *) tag)) {
- php_error_docref(NULL, E_WARNING, "Setting tag for AEAD cipher decryption failed");
- return FAILURE;
- }
- }
-
- password_len = (int) *ppassword_len;
- key_len = EVP_CIPHER_key_length(cipher_type);
- if (key_len > password_len) {
- if ((OPENSSL_DONT_ZERO_PAD_KEY & options) && !EVP_CIPHER_CTX_set_key_length(cipher_ctx, password_len)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Key length cannot be set for the cipher method");
- return FAILURE;
- }
- key = emalloc(key_len);
- memset(key, 0, key_len);
- memcpy(key, *ppassword, password_len);
- *ppassword = (char *) key;
- *ppassword_len = key_len;
- *free_password = 1;
- } else {
- if (password_len > key_len && !EVP_CIPHER_CTX_set_key_length(cipher_ctx, password_len)) {
- php_openssl_store_errors();
- }
- key = (unsigned char*)*ppassword;
- }
- if (!EVP_CipherInit_ex(cipher_ctx, NULL, NULL, key, (unsigned char *)*piv, enc)) {
- php_openssl_store_errors();
- return FAILURE;
- }
- if (options & OPENSSL_ZERO_PADDING) {
- EVP_CIPHER_CTX_set_padding(cipher_ctx, 0);
- }
- return SUCCESS;
- }
- static int php_openssl_cipher_update(const EVP_CIPHER *cipher_type,
- EVP_CIPHER_CTX *cipher_ctx, struct php_openssl_cipher_mode *mode,
- zend_string **poutbuf, int *poutlen, char *data, size_t data_len,
- char *aad, size_t aad_len, int enc)
- {
- int i = 0;
- if (mode->is_single_run_aead && !EVP_CipherUpdate(cipher_ctx, NULL, &i, NULL, (int)data_len)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Setting of data length failed");
- return FAILURE;
- }
- if (mode->is_aead && !EVP_CipherUpdate(cipher_ctx, NULL, &i, (unsigned char *)aad, (int)aad_len)) {
- php_openssl_store_errors();
- php_error_docref(NULL, E_WARNING, "Setting of additional application data failed");
- return FAILURE;
- }
- *poutbuf = zend_string_alloc((int)data_len + EVP_CIPHER_block_size(cipher_type), 0);
- if (!EVP_CipherUpdate(cipher_ctx, (unsigned char*)ZSTR_VAL(*poutbuf),
- &i, (unsigned char *)data, (int)data_len)) {
-
- php_openssl_store_errors();
- zend_string_release_ex(*poutbuf, 0);
- return FAILURE;
- }
- *poutlen = i;
- return SUCCESS;
- }
- PHP_FUNCTION(openssl_encrypt)
- {
- zend_long options = 0, tag_len = 16;
- char *data, *method, *password, *iv = "", *aad = "";
- size_t data_len, method_len, password_len, iv_len = 0, aad_len = 0;
- zval *tag = NULL;
- const EVP_CIPHER *cipher_type;
- EVP_CIPHER_CTX *cipher_ctx;
- struct php_openssl_cipher_mode mode;
- int i=0, outlen;
- zend_string *outbuf;
- zend_bool free_iv = 0, free_password = 0;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss|lsz/sl", &data, &data_len, &method, &method_len,
- &password, &password_len, &options, &iv, &iv_len, &tag, &aad, &aad_len, &tag_len) == FAILURE) {
- return;
- }
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(data_len, data);
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(password_len, password);
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(aad_len, aad);
- PHP_OPENSSL_CHECK_LONG_TO_INT(tag_len, tag_len);
- cipher_type = EVP_get_cipherbyname(method);
- if (!cipher_type) {
- php_error_docref(NULL, E_WARNING, "Unknown cipher algorithm");
- RETURN_FALSE;
- }
- cipher_ctx = EVP_CIPHER_CTX_new();
- if (!cipher_ctx) {
- php_error_docref(NULL, E_WARNING, "Failed to create cipher context");
- RETURN_FALSE;
- }
- php_openssl_load_cipher_mode(&mode, cipher_type);
- if (php_openssl_cipher_init(cipher_type, cipher_ctx, &mode,
- &password, &password_len, &free_password,
- &iv, &iv_len, &free_iv, NULL, tag_len, options, 1) == FAILURE ||
- php_openssl_cipher_update(cipher_type, cipher_ctx, &mode, &outbuf, &outlen,
- data, data_len, aad, aad_len, 1) == FAILURE) {
- RETVAL_FALSE;
- } else if (EVP_EncryptFinal(cipher_ctx, (unsigned char *)ZSTR_VAL(outbuf) + outlen, &i)) {
- outlen += i;
- if (options & OPENSSL_RAW_DATA) {
- ZSTR_VAL(outbuf)[outlen] = '\0';
- ZSTR_LEN(outbuf) = outlen;
- RETVAL_STR(outbuf);
- } else {
- zend_string *base64_str;
- base64_str = php_base64_encode((unsigned char*)ZSTR_VAL(outbuf), outlen);
- zend_string_release_ex(outbuf, 0);
- outbuf = base64_str;
- RETVAL_STR(base64_str);
- }
- if (mode.is_aead && tag) {
- zend_string *tag_str = zend_string_alloc(tag_len, 0);
- if (EVP_CIPHER_CTX_ctrl(cipher_ctx, mode.aead_get_tag_flag, tag_len, ZSTR_VAL(tag_str)) == 1) {
- zval_ptr_dtor(tag);
- ZSTR_VAL(tag_str)[tag_len] = '\0';
- ZSTR_LEN(tag_str) = tag_len;
- ZVAL_NEW_STR(tag, tag_str);
- } else {
- php_error_docref(NULL, E_WARNING, "Retrieving verification tag failed");
- zend_string_release_ex(tag_str, 0);
- zend_string_release_ex(outbuf, 0);
- RETVAL_FALSE;
- }
- } else if (tag) {
- zval_ptr_dtor(tag);
- ZVAL_NULL(tag);
- php_error_docref(NULL, E_WARNING,
- "The authenticated tag cannot be provided for cipher that doesn not support AEAD");
- } else if (mode.is_aead) {
- php_error_docref(NULL, E_WARNING, "A tag should be provided when using AEAD mode");
- zend_string_release_ex(outbuf, 0);
- RETVAL_FALSE;
- }
- } else {
- php_openssl_store_errors();
- zend_string_release_ex(outbuf, 0);
- RETVAL_FALSE;
- }
- if (free_password) {
- efree(password);
- }
- if (free_iv) {
- efree(iv);
- }
- EVP_CIPHER_CTX_cleanup(cipher_ctx);
- EVP_CIPHER_CTX_free(cipher_ctx);
- }
- PHP_FUNCTION(openssl_decrypt)
- {
- zend_long options = 0;
- char *data, *method, *password, *iv = "", *tag = NULL, *aad = "";
- size_t data_len, method_len, password_len, iv_len = 0, tag_len = 0, aad_len = 0;
- const EVP_CIPHER *cipher_type;
- EVP_CIPHER_CTX *cipher_ctx;
- struct php_openssl_cipher_mode mode;
- int i = 0, outlen;
- zend_string *outbuf;
- zend_string *base64_str = NULL;
- zend_bool free_iv = 0, free_password = 0;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "sss|lsss", &data, &data_len, &method, &method_len,
- &password, &password_len, &options, &iv, &iv_len, &tag, &tag_len, &aad, &aad_len) == FAILURE) {
- return;
- }
- if (!method_len) {
- php_error_docref(NULL, E_WARNING, "Unknown cipher algorithm");
- RETURN_FALSE;
- }
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(data_len, data);
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(password_len, password);
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(aad_len, aad);
- PHP_OPENSSL_CHECK_SIZE_T_TO_INT(tag_len, tag);
- cipher_type = EVP_get_cipherbyname(method);
- if (!cipher_type) {
- php_error_docref(NULL, E_WARNING, "Unknown cipher algorithm");
- RETURN_FALSE;
- }
- cipher_ctx = EVP_CIPHER_CTX_new();
- if (!cipher_ctx) {
- php_error_docref(NULL, E_WARNING, "Failed to create cipher context");
- RETURN_FALSE;
- }
- php_openssl_load_cipher_mode(&mode, cipher_type);
- if (!(options & OPENSSL_RAW_DATA)) {
- base64_str = php_base64_decode((unsigned char*)data, data_len);
- if (!base64_str) {
- php_error_docref(NULL, E_WARNING, "Failed to base64 decode the input");
- EVP_CIPHER_CTX_free(cipher_ctx);
- RETURN_FALSE;
- }
- data_len = ZSTR_LEN(base64_str);
- data = ZSTR_VAL(base64_str);
- }
- if (php_openssl_cipher_init(cipher_type, cipher_ctx, &mode,
- &password, &password_len, &free_password,
- &iv, &iv_len, &free_iv, tag, tag_len, options, 0) == FAILURE ||
- php_openssl_cipher_update(cipher_type, cipher_ctx, &mode, &outbuf, &outlen,
- data, data_len, aad, aad_len, 0) == FAILURE) {
- RETVAL_FALSE;
- } else if (mode.is_single_run_aead ||
- EVP_DecryptFinal(cipher_ctx, (unsigned char *)ZSTR_VAL(outbuf) + outlen, &i)) {
- outlen += i;
- ZSTR_VAL(outbuf)[outlen] = '\0';
- ZSTR_LEN(outbuf) = outlen;
- RETVAL_STR(outbuf);
- } else {
- php_openssl_store_errors();
- zend_string_release_ex(outbuf, 0);
- RETVAL_FALSE;
- }
- if (free_password) {
- efree(password);
- }
- if (free_iv) {
- efree(iv);
- }
- if (base64_str) {
- zend_string_release_ex(base64_str, 0);
- }
- EVP_CIPHER_CTX_cleanup(cipher_ctx);
- EVP_CIPHER_CTX_free(cipher_ctx);
- }
- PHP_FUNCTION(openssl_cipher_iv_length)
- {
- char *method;
- size_t method_len;
- const EVP_CIPHER *cipher_type;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "s", &method, &method_len) == FAILURE) {
- return;
- }
- if (!method_len) {
- php_error_docref(NULL, E_WARNING, "Unknown cipher algorithm");
- RETURN_FALSE;
- }
- cipher_type = EVP_get_cipherbyname(method);
- if (!cipher_type) {
- php_error_docref(NULL, E_WARNING, "Unknown cipher algorithm");
- RETURN_FALSE;
- }
- RETURN_LONG(EVP_CIPHER_iv_length(cipher_type));
- }
- PHP_FUNCTION(openssl_random_pseudo_bytes)
- {
- zend_long buffer_length;
- zend_string *buffer = NULL;
- zval *zstrong_result_returned = NULL;
- if (zend_parse_parameters(ZEND_NUM_ARGS(), "l|z/", &buffer_length, &zstrong_result_returned) == FAILURE) {
- return;
- }
- if (zstrong_result_returned) {
- zval_ptr_dtor(zstrong_result_returned);
- ZVAL_FALSE(zstrong_result_returned);
- }
- if (buffer_length <= 0
- #ifndef PHP_WIN32
- || ZEND_LONG_INT_OVFL(buffer_length)
- #endif
- ) {
- RETURN_FALSE;
- }
- buffer = zend_string_alloc(buffer_length, 0);
- #ifdef PHP_WIN32
-
- if (php_win32_get_random_bytes((unsigned char*)buffer->val, (size_t) buffer_length) == FAILURE){
- zend_string_release_ex(buffer, 0);
- if (zstrong_result_returned) {
- ZVAL_FALSE(zstrong_result_returned);
- }
- RETURN_FALSE;
- }
- #else
- PHP_OPENSSL_CHECK_LONG_TO_INT(buffer_length, length);
- PHP_OPENSSL_RAND_ADD_TIME();
-
- if (RAND_bytes((unsigned char*)ZSTR_VAL(buffer), (int)buffer_length) <= 0) {
- zend_string_release_ex(buffer, 0);
- if (zstrong_result_returned) {
- ZVAL_FALSE(zstrong_result_returned);
- }
- RETURN_FALSE;
- } else {
- php_openssl_store_errors();
- }
- #endif
- ZSTR_VAL(buffer)[buffer_length] = 0;
- RETVAL_NEW_STR(buffer);
- if (zstrong_result_returned) {
- ZVAL_BOOL(zstrong_result_returned, 1);
- }
- }
|