getAlgorith() public method

See also: getAlgorithm()
Deprecation:
public getAlgorith ( ) : mixed
return mixed
Example #1
0
 /**
  * Encrypt the selected node with the given key.
  *
  * @param XMLSecurityKey $objKey  The encryption key and algorithm.
  * @param bool           $replace Whether the encrypted node should be replaced in the original tree. Default is true.
  *
  * @return DOMElement  The <xenc:EncryptedData>-element.
  */
 public function encryptNode($objKey, $replace = true)
 {
     $data = '';
     if (empty($this->rawNode)) {
         throw new Exception('Node to encrypt has not been set');
     }
     if (!$objKey instanceof XMLSecurityKey) {
         throw new Exception('Invalid Key');
     }
     $doc = $this->rawNode->ownerDocument;
     $xPath = new DOMXPath($this->encdoc);
     $objList = $xPath->query('/xenc:EncryptedData/xenc:CipherData/xenc:CipherValue');
     $cipherValue = $objList->item(0);
     if ($cipherValue == null) {
         throw new Exception('Error locating CipherValue element within template');
     }
     switch ($this->type) {
         case self::Element:
             $data = $doc->saveXML($this->rawNode);
             $this->encdoc->documentElement->setAttribute('Type', self::Element);
             break;
         case self::Content:
             $children = $this->rawNode->childNodes;
             foreach ($children as $child) {
                 $data .= $doc->saveXML($child);
             }
             $this->encdoc->documentElement->setAttribute('Type', self::Content);
             break;
         default:
             throw new Exception('Type is currently not supported');
     }
     $encMethod = $this->encdoc->documentElement->appendChild($this->encdoc->createElementNS(self::XMLENCNS, 'xenc:EncryptionMethod'));
     $encMethod->setAttribute('Algorithm', $objKey->getAlgorith());
     $cipherValue->parentNode->parentNode->insertBefore($encMethod, $cipherValue->parentNode->parentNode->firstChild);
     $strEncrypt = base64_encode($objKey->encryptData($data));
     $value = $this->encdoc->createTextNode($strEncrypt);
     $cipherValue->appendChild($value);
     if ($replace) {
         switch ($this->type) {
             case self::Element:
                 if ($this->rawNode->nodeType == XML_DOCUMENT_NODE) {
                     return $this->encdoc;
                 }
                 $importEnc = $this->rawNode->ownerDocument->importNode($this->encdoc->documentElement, true);
                 $this->rawNode->parentNode->replaceChild($importEnc, $this->rawNode);
                 return $importEnc;
             case self::Content:
                 $importEnc = $this->rawNode->ownerDocument->importNode($this->encdoc->documentElement, true);
                 while ($this->rawNode->firstChild) {
                     $this->rawNode->removeChild($this->rawNode->firstChild);
                 }
                 $this->rawNode->appendChild($importEnc);
                 return $importEnc;
         }
     } else {
         return $this->encdoc->documentElement;
     }
 }
Example #2
0
 /**
  * Encrypt the XMLSecurityKey
  *
  * @param XMLSecurityKey $srcKey
  * @param XMLSecurityKey $rawKey
  * @param bool $append
  * @throws Exception
  */
 public function encryptKey($srcKey, $rawKey, $append = true)
 {
     if (!$srcKey instanceof XMLSecurityKey || !$rawKey instanceof XMLSecurityKey) {
         throw new Exception('Invalid Key');
     }
     $strEncKey = base64_encode($srcKey->encryptData($rawKey->key));
     $root = $this->encdoc->documentElement;
     $encKey = $this->encdoc->createElementNS(self::XMLENCNS, 'xenc:EncryptedKey');
     if ($append) {
         $keyInfo = $root->insertBefore($this->encdoc->createElementNS('http://www.w3.org/2000/09/xmldsig#', 'dsig:KeyInfo'), $root->firstChild);
         $keyInfo->appendChild($encKey);
     } else {
         $this->encKey = $encKey;
     }
     $encMethod = $encKey->appendChild($this->encdoc->createElementNS(self::XMLENCNS, 'xenc:EncryptionMethod'));
     $encMethod->setAttribute('Algorithm', $srcKey->getAlgorith());
     if (!empty($srcKey->name)) {
         $keyInfo = $encKey->appendChild($this->encdoc->createElementNS('http://www.w3.org/2000/09/xmldsig#', 'dsig:KeyInfo'));
         $keyInfo->appendChild($this->encdoc->createElementNS('http://www.w3.org/2000/09/xmldsig#', 'dsig:KeyName', $srcKey->name));
     }
     $cipherData = $encKey->appendChild($this->encdoc->createElementNS(self::XMLENCNS, 'xenc:CipherData'));
     $cipherData->appendChild($this->encdoc->createElementNS(self::XMLENCNS, 'xenc:CipherValue', $strEncKey));
     if (is_array($this->references) && count($this->references) > 0) {
         $refList = $encKey->appendChild($this->encdoc->createElementNS(self::XMLENCNS, 'xenc:ReferenceList'));
         foreach ($this->references as $name => $reference) {
             $refuri = $reference["refuri"];
             $dataRef = $refList->appendChild($this->encdoc->createElementNS(self::XMLENCNS, 'xenc:DataReference'));
             $dataRef->setAttribute("URI", '#' . $refuri);
         }
     }
     return;
 }
Example #3
0
 /**
  * Decrypt an encrypted element.
  *
  * This is an internal helper function.
  *
  * @param  \DOMElement     $encryptedData The encrypted data.
  * @param  XMLSecurityKey $inputKey      The decryption key.
  * @param  array          &$blacklist    Blacklisted decryption algorithms.
  * @return \DOMElement     The decrypted element.
  * @throws \Exception
  */
 private static function doDecryptElement(\DOMElement $encryptedData, XMLSecurityKey $inputKey, array &$blacklist)
 {
     $enc = new XMLSecEnc();
     $enc->setNode($encryptedData);
     $enc->type = $encryptedData->getAttribute("Type");
     $symmetricKey = $enc->locateKey($encryptedData);
     if (!$symmetricKey) {
         throw new \Exception('Could not locate key algorithm in encrypted data.');
     }
     $symmetricKeyInfo = $enc->locateKeyInfo($symmetricKey);
     if (!$symmetricKeyInfo) {
         throw new \Exception('Could not locate <dsig:KeyInfo> for the encrypted key.');
     }
     $inputKeyAlgo = $inputKey->getAlgorith();
     if ($symmetricKeyInfo->isEncrypted) {
         $symKeyInfoAlgo = $symmetricKeyInfo->getAlgorith();
         if (in_array($symKeyInfoAlgo, $blacklist, true)) {
             throw new \Exception('Algorithm disabled: ' . var_export($symKeyInfoAlgo, true));
         }
         if ($symKeyInfoAlgo === XMLSecurityKey::RSA_OAEP_MGF1P && $inputKeyAlgo === XMLSecurityKey::RSA_1_5) {
             /*
              * The RSA key formats are equal, so loading an RSA_1_5 key
              * into an RSA_OAEP_MGF1P key can be done without problems.
              * We therefore pretend that the input key is an
              * RSA_OAEP_MGF1P key.
              */
             $inputKeyAlgo = XMLSecurityKey::RSA_OAEP_MGF1P;
         }
         /* Make sure that the input key format is the same as the one used to encrypt the key. */
         if ($inputKeyAlgo !== $symKeyInfoAlgo) {
             throw new \Exception('Algorithm mismatch between input key and key used to encrypt ' . ' the symmetric key for the message. Key was: ' . var_export($inputKeyAlgo, true) . '; message was: ' . var_export($symKeyInfoAlgo, true));
         }
         /** @var XMLSecEnc $encKey */
         $encKey = $symmetricKeyInfo->encryptedCtx;
         $symmetricKeyInfo->key = $inputKey->key;
         $keySize = $symmetricKey->getSymmetricKeySize();
         if ($keySize === null) {
             /* To protect against "key oracle" attacks, we need to be able to create a
              * symmetric key, and for that we need to know the key size.
              */
             throw new \Exception('Unknown key size for encryption algorithm: ' . var_export($symmetricKey->type, true));
         }
         try {
             $key = $encKey->decryptKey($symmetricKeyInfo);
             if (strlen($key) != $keySize) {
                 throw new \Exception('Unexpected key size (' . strlen($key) * 8 . 'bits) for encryption algorithm: ' . var_export($symmetricKey->type, true));
             }
         } catch (\Exception $e) {
             /* We failed to decrypt this key. Log it, and substitute a "random" key. */
             Utils::getContainer()->getLogger()->error('Failed to decrypt symmetric key: ' . $e->getMessage());
             /* Create a replacement key, so that it looks like we fail in the same way as if the key was correctly padded. */
             /* We base the symmetric key on the encrypted key and private key, so that we always behave the
              * same way for a given input key.
              */
             $encryptedKey = $encKey->getCipherValue();
             $pkey = openssl_pkey_get_details($symmetricKeyInfo->key);
             $pkey = sha1(serialize($pkey), true);
             $key = sha1($encryptedKey . $pkey, true);
             /* Make sure that the key has the correct length. */
             if (strlen($key) > $keySize) {
                 $key = substr($key, 0, $keySize);
             } elseif (strlen($key) < $keySize) {
                 $key = str_pad($key, $keySize);
             }
         }
         $symmetricKey->loadkey($key);
     } else {
         $symKeyAlgo = $symmetricKey->getAlgorith();
         /* Make sure that the input key has the correct format. */
         if ($inputKeyAlgo !== $symKeyAlgo) {
             throw new \Exception('Algorithm mismatch between input key and key in message. ' . 'Key was: ' . var_export($inputKeyAlgo, true) . '; message was: ' . var_export($symKeyAlgo, true));
         }
         $symmetricKey = $inputKey;
     }
     $algorithm = $symmetricKey->getAlgorith();
     if (in_array($algorithm, $blacklist, true)) {
         throw new \Exception('Algorithm disabled: ' . var_export($algorithm, true));
     }
     /** @var string $decrypted */
     $decrypted = $enc->decryptNode($symmetricKey, false);
     /*
      * This is a workaround for the case where only a subset of the XML
      * tree was serialized for encryption. In that case, we may miss the
      * namespaces needed to parse the XML.
      */
     $xml = '<root xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ' . 'xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">' . $decrypted . '</root>';
     try {
         $newDoc = DOMDocumentFactory::fromString($xml);
     } catch (RuntimeException $e) {
         throw new \Exception('Failed to parse decrypted XML. Maybe the wrong sharedkey was used?', 0, $e);
     }
     $decryptedElement = $newDoc->firstChild->firstChild;
     if ($decryptedElement === null) {
         throw new \Exception('Missing encrypted element.');
     }
     if (!$decryptedElement instanceof \DOMElement) {
         throw new \Exception('Decrypted element was not actually a \\DOMElement.');
     }
     return $decryptedElement;
 }