56 'ES384' => [
'openssl',
'SHA384'],
57 'ES256' => [
'openssl',
'SHA256'],
58 'ES256K' => [
'openssl',
'SHA256'],
59 'HS256' => [
'hash_hmac',
'SHA256'],
60 'HS384' => [
'hash_hmac',
'SHA384'],
61 'HS512' => [
'hash_hmac',
'SHA512'],
62 'RS256' => [
'openssl',
'SHA256'],
63 'RS384' => [
'openssl',
'SHA384'],
64 'RS512' => [
'openssl',
'SHA512'],
65 'EdDSA' => [
'sodium_crypto',
'EdDSA'],
104 if (empty($keyOrKeyArray)) {
107 $tks = \explode(
'.', $jwt);
108 if (\count($tks) !== 3) {
111 list($headb64, $bodyb64, $cryptob64) = $tks;
112 $headerRaw = static::urlsafeB64Decode($headb64);
113 if (null === ($header = static::jsonDecode($headerRaw))) {
116 if ($headers !== null) {
119 $payloadRaw = static::urlsafeB64Decode($bodyb64);
120 if (null === (
$payload = static::jsonDecode($payloadRaw))) {
130 $sig = static::urlsafeB64Decode($cryptob64);
131 if (empty($header->alg)) {
134 if (empty(static::$supported_algs[$header->alg])) {
138 $key =
self::getKey($keyOrKeyArray, property_exists($header,
'kid') ? $header->kid : null);
141 if (!self::constantTimeEquals(
$key->getAlgorithm(), $header->alg)) {
145 if (\in_array($header->alg, [
'ES256',
'ES256K',
'ES384'],
true)) {
147 $sig = self::signatureToDER($sig);
149 if (!self::verify(
"{$headb64}.{$bodyb64}", $sig,
$key->getKeyMaterial(), $header->alg)) {
155 if (isset(
$payload->nbf) && floor(
$payload->nbf) > ($timestamp + static::$leeway)) {
157 'Cannot handle token with nbf prior to ' . \date(DateTime::ISO8601, (
int)
$payload->nbf)
168 'Cannot handle token with iat prior to ' . \date(DateTime::ISO8601, (
int)
$payload->iat)
175 if (isset(
$payload->exp) && ($timestamp - static::$leeway) >=
$payload->exp) {
203 string $keyId = null,
206 $header = [
'typ' =>
'JWT',
'alg' => $alg];
207 if ($keyId !== null) {
208 $header[
'kid'] = $keyId;
210 if (isset($head) && \is_array($head)) {
211 $header = \array_merge($head, $header);
214 $segments[] = static::urlsafeB64Encode((
string) static::jsonEncode($header));
215 $segments[] = static::urlsafeB64Encode((
string) static::jsonEncode($payload));
216 $signing_input = \implode(
'.', $segments);
218 $signature = static::sign($signing_input,
$key, $alg);
219 $segments[] = static::urlsafeB64Encode($signature);
221 return \implode(
'.', $segments);
241 if (empty(static::$supported_algs[$alg])) {
244 list($function, $algorithm) = static::$supported_algs[$alg];
247 if (!\is_string(
$key)) {
250 return \hash_hmac($algorithm, $msg,
$key,
true);
253 $success = \openssl_sign($msg, $signature,
$key, $algorithm);
257 if ($alg ===
'ES256' || $alg ===
'ES256K') {
258 $signature = self::signatureFromDER($signature, 256);
259 } elseif ($alg ===
'ES384') {
260 $signature = self::signatureFromDER($signature, 384);
263 case 'sodium_crypto':
264 if (!\function_exists(
'sodium_crypto_sign_detached')) {
267 if (!\is_string(
$key)) {
272 $lines = array_filter(explode(
"\n",
$key));
273 $key = base64_decode((
string) end($lines));
274 if (\strlen(
$key) === 0) {
277 return sodium_crypto_sign_detached($msg,
$key);
305 if (empty(static::$supported_algs[$alg])) {
309 list($function, $algorithm) = static::$supported_algs[$alg];
312 $success = \openssl_verify($msg, $signature, $keyMaterial, $algorithm);
313 if ($success === 1) {
316 if ($success === 0) {
321 'OpenSSL error: ' . \openssl_error_string()
323 case 'sodium_crypto':
324 if (!\function_exists(
'sodium_crypto_sign_verify_detached')) {
327 if (!\is_string($keyMaterial)) {
332 $lines = array_filter(explode(
"\n", $keyMaterial));
333 $key = base64_decode((
string) end($lines));
334 if (\strlen(
$key) === 0) {
337 if (\strlen($signature) === 0) {
340 return sodium_crypto_sign_verify_detached($signature, $msg,
$key);
346 if (!\is_string($keyMaterial)) {
349 $hash = \hash_hmac($algorithm, $msg, $keyMaterial,
true);
350 return self::constantTimeEquals($hash, $signature);
365 $obj = \json_decode($input,
false, 512, JSON_BIGINT_AS_STRING);
367 if ($errno = \json_last_error()) {
368 self::handleJsonError($errno);
369 } elseif ($obj === null && $input !==
'null') {
386 if (PHP_VERSION_ID >= 50400) {
387 $json = \json_encode($input, \JSON_UNESCAPED_SLASHES);
390 $json = \json_encode($input);
392 if ($errno = \json_last_error()) {
393 self::handleJsonError($errno);
394 } elseif ($json ===
'null') {
397 if ($json ===
false) {
398 throw new DomainException(
'Provided object could not be encoded to valid JSON');
414 return \base64_decode(self::convertBase64UrlToBase64($input));
429 $remainder = \strlen($input) % 4;
431 $padlen = 4 - $remainder;
432 $input .= \str_repeat(
'=', $padlen);
434 return \strtr($input,
'-_',
'+/');
446 return \str_replace(
'=',
'', \strtr(\base64_encode($input),
'+/',
'-_'));
464 if ($keyOrKeyArray instanceof
Key) {
465 return $keyOrKeyArray;
468 if (empty($kid) && $kid !==
'0') {
474 return $keyOrKeyArray[
$kid];
477 if (!isset($keyOrKeyArray[$kid])) {
481 return $keyOrKeyArray[
$kid];
491 if (\function_exists(
'hash_equals')) {
492 return \hash_equals($left, $right);
494 $len = \min(self::safeStrlen($left), self::safeStrlen($right));
497 for (
$i = 0;
$i < $len;
$i++) {
498 $status |= (\ord($left[
$i]) ^ \ord($right[$i]));
500 $status |= (self::safeStrlen($left) ^ self::safeStrlen($right));
502 return ($status === 0);
517 JSON_ERROR_DEPTH =>
'Maximum stack depth exceeded',
518 JSON_ERROR_STATE_MISMATCH =>
'Invalid or malformed JSON',
519 JSON_ERROR_CTRL_CHAR =>
'Unexpected control character found',
520 JSON_ERROR_SYNTAX =>
'Syntax error, malformed JSON',
521 JSON_ERROR_UTF8 =>
'Malformed UTF-8 characters' 526 :
'Unknown JSON error: ' . $errno
539 if (\function_exists(
'mb_strlen')) {
540 return \mb_strlen($str,
'8bit');
542 return \strlen($str);
554 $length = max(1, (
int) (\strlen($sig) / 2));
555 list($r, $s) = \str_split($sig, $length);
558 $r = \ltrim($r,
"\x00");
559 $s = \ltrim($s,
"\x00");
563 if (\ord($r[0]) > 0x7f) {
566 if (\ord($s[0]) > 0x7f) {
570 return self::encodeDER(
572 self::encodeDER(self::ASN1_INTEGER, $r) .
573 self::encodeDER(self::ASN1_INTEGER, $s)
588 if ($type === self::ASN1_SEQUENCE) {
593 $der = \chr($tag_header | $type);
596 $der .= \chr(\strlen($value));
598 return $der . $value;
612 list($offset, $_) = self::readDER($der);
613 list($offset, $r) = self::readDER($der, $offset);
614 list($offset, $s) = self::readDER($der, $offset);
618 $r = \ltrim($r,
"\x00");
619 $s = \ltrim($s,
"\x00");
622 $r = \str_pad($r, $keySize / 8,
"\x00", STR_PAD_LEFT);
623 $s = \str_pad($s, $keySize / 8,
"\x00", STR_PAD_LEFT);
637 private static function readDER(
string $der,
int $offset = 0): array
640 $size = \strlen($der);
641 $constructed = (\ord($der[$pos]) >> 5) & 0x01;
642 $type = \ord($der[$pos++]) & 0x1f;
645 $len = \ord($der[$pos++]);
649 while ($n-- && $pos < $size) {
650 $len = ($len << 8) | \ord($der[$pos++]);
655 if (
$type === self::ASN1_BIT_STRING) {
657 $data = \substr($der, $pos, $len - 1);
659 } elseif (!$constructed) {
660 $data = \substr($der, $pos, $len);
666 return [$pos,
$data];
static getKey( $keyOrKeyArray, ?string $kid)
Determine if an algorithm has been provided for each Key.
static safeStrlen(string $str)
Get the number of bytes in cryptographic strings.
static urlsafeB64Encode(string $input)
Encode a string with URL-safe Base64.
static jsonDecode(string $input)
Decode a JSON string into a PHP object.
static jsonEncode(array $input)
Encode a PHP array into a JSON string.
static convertBase64UrlToBase64(string $input)
Convert a string in the base64url (URL-safe Base64) encoding to standard base64.
static handleJsonError(int $errno)
Helper method to create a JSON error.
if(count($parts) !=3) $payload
static verify(string $msg, string $signature, $keyMaterial, string $alg)
Verify a signature with the message, key and method.
static readDER(string $der, int $offset=0)
Reads binary DER-encoded data and decodes into a single object.
static constantTimeEquals(string $left, string $right)
$messages
This file is part of ILIAS, a powerful learning management system published by ILIAS open source e-Le...
static array static decode(string $jwt, $keyOrKeyArray, stdClass &$headers=null)
Decodes a JWT string into a PHP object.
static signatureToDER(string $sig)
Convert an ECDSA signature to an ASN.1 DER sequence.
static sign(string $msg, $key, string $alg)
Sign a string with a given key and algorithm.
foreach($mandatory_scripts as $file) $timestamp
static encode(array $payload, $key, string $alg, string $keyId=null, array $head=null)
Converts and signs a PHP array into a JWT string.
static array $supported_algs
static signatureFromDER(string $der, int $keySize)
Encodes signature from a DER object.
static urlsafeB64Decode(string $input)
Decode a string with URL-safe Base64.
static encodeDER(int $type, string $value)
Encodes a value into a DER object.