mirror of
https://github.com/phpseclib/phpseclib.git
synced 2024-11-05 13:07:53 +00:00
Merge pull request #721 from terrafrost/x509-rsa-null-1.0
parameter field should be null for RSA keys in X509 certs / fix for 1.0 branch * terrafrost/x509-rsa-null-1.0: Tests/X509: CS adjustments Tests/X509: typo X509: set parameter field to null for RSA keys
This commit is contained in:
commit
e0690f6b23
@ -897,7 +897,7 @@ class File_ASN1
|
|||||||
}
|
}
|
||||||
|
|
||||||
foreach ($mapping['children'] as $key => $child) {
|
foreach ($mapping['children'] as $key => $child) {
|
||||||
if (!isset($source[$key])) {
|
if (!array_key_exists($key, $source)) {
|
||||||
if (!isset($child['optional'])) {
|
if (!isset($child['optional'])) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
@ -1505,6 +1505,13 @@ class File_X509
|
|||||||
case 'rsaEncryption':
|
case 'rsaEncryption':
|
||||||
$cert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey']
|
$cert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey']
|
||||||
= base64_encode("\0" . base64_decode(preg_replace('#-.+-|[\r\n]#', '', $cert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey'])));
|
= base64_encode("\0" . base64_decode(preg_replace('#-.+-|[\r\n]#', '', $cert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey'])));
|
||||||
|
/* "[For RSA keys] the parameters field MUST have ASN.1 type NULL for this algorithm identifier."
|
||||||
|
-- https://tools.ietf.org/html/rfc3279#section-2.3.1
|
||||||
|
|
||||||
|
given that and the fact that RSA keys appear ot be the only key type for which the parameters field can be blank,
|
||||||
|
it seems like perhaps the ASN.1 description ought not say the parameters field is OPTIONAL, but whatever.
|
||||||
|
*/
|
||||||
|
$cert['tbsCertificate']['subjectPublicKeyInfo']['algorithm']['parameters'] = null;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -83,7 +83,7 @@ IOkKcGQRCMha8X2e7GmlpdWC1ycenlbN0nbVeSv3JUMcafC4+Q==
|
|||||||
|
|
||||||
$asn1 = new File_ASN1();
|
$asn1 = new File_ASN1();
|
||||||
|
|
||||||
$value = $this->encodeOID('1.2.3.4');
|
$value = $this->_encodeOID('1.2.3.4');
|
||||||
$ext = chr(FILE_ASN1_TYPE_OBJECT_IDENTIFIER) . $asn1->_encodeLength(strlen($value)) . $value;
|
$ext = chr(FILE_ASN1_TYPE_OBJECT_IDENTIFIER) . $asn1->_encodeLength(strlen($value)) . $value;
|
||||||
$value = 'zzzzzzzzz';
|
$value = 'zzzzzzzzz';
|
||||||
$ext.= chr(FILE_ASN1_TYPE_OCTET_STRING) . $asn1->_encodeLength(strlen($value)) . $value;
|
$ext.= chr(FILE_ASN1_TYPE_OCTET_STRING) . $asn1->_encodeLength(strlen($value)) . $value;
|
||||||
@ -96,7 +96,50 @@ IOkKcGQRCMha8X2e7GmlpdWC1ycenlbN0nbVeSv3JUMcafC4+Q==
|
|||||||
$this->assertCount(5, $result['tbsCertificate']['extensions']);
|
$this->assertCount(5, $result['tbsCertificate']['extensions']);
|
||||||
}
|
}
|
||||||
|
|
||||||
function encodeOID($oid)
|
/**
|
||||||
|
* @group github705
|
||||||
|
*/
|
||||||
|
public function testSaveNullRSAParam()
|
||||||
|
{
|
||||||
|
$privKey = new Crypt_RSA();
|
||||||
|
$privKey->loadKey('-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
MIICXQIBAAKBgQDMswfEpAgnUDWA74zZw5XcPsWh1ly1Vk99tsqwoFDkLF7jvXy1
|
||||||
|
dDLHYfuquvfxCgcp8k/4fQhx4ubR8bbGgEq9B05YRnViK0R0iBB5Ui4IaxWYYhKE
|
||||||
|
8xqAEH2fL+/7nsqqNFKkEN9KeFwc7WbMY49U2adlMrpBdRjk1DqIEW3QTwIDAQAB
|
||||||
|
AoGBAJ+83cT/1DUJjJcPWLTeweVbPtJp+3Ku5d1OdaGbmURVs764scbP5Ihe2AuF
|
||||||
|
V9LLZoe/RdS9jYeB72nJ3D3PA4JVYYgqMOnJ8nlUMNQ+p0yGl5TqQk6EKLI8MbX5
|
||||||
|
kQEazNqFXsiWVQXubAd5wjtb6g0n0KD3zoT/pWLES7dtUFexAkEA89h5+vbIIl2P
|
||||||
|
H/NnkPie2NWYDZ1YiMGHFYxPDwsd9KCZMSbrLwAhPg9bPgqIeVNfpwxrzeksS6D9
|
||||||
|
P98tJt335QJBANbnCe+LhDSrkpHMy9aOG2IdbLGG63MSRUCPz8v2gKPq3kYXDxq6
|
||||||
|
Y1iqF8N5g0k5iirHD2qlWV5Q+nuGvFTafCMCQQC1wQiC0IkyXEw/Q31RqI82Dlcs
|
||||||
|
5rhEDwQyQof3LZEhcsdcxKaOPOmKSYX4A3/f9w4YBIEiVQfoQ1Ig1qfgDZklAkAT
|
||||||
|
TQDJcOBY0qgBTEFqbazr7PScJR/0X8m0eLYS/XqkPi3kYaHLpr3RcsVbmwg9hVtx
|
||||||
|
aBtsWpliLSex/HHhtRW9AkBGcq67zKmEpJ9kXcYLEjJii3flFS+Ct/rNm+Hhm1l7
|
||||||
|
4vca9v/F2hGVJuHIMJ8mguwYlNYzh2NqoIDJTtgOkBmt
|
||||||
|
-----END RSA PRIVATE KEY-----');
|
||||||
|
|
||||||
|
$pubKey = new Crypt_RSA();
|
||||||
|
$pubKey->loadKey($privKey->getPublicKey());
|
||||||
|
$pubKey->setPublicKey();
|
||||||
|
|
||||||
|
$subject = new File_X509();
|
||||||
|
$subject->setDNProp('id-at-organizationName', 'phpseclib demo cert');
|
||||||
|
$subject->setPublicKey($pubKey);
|
||||||
|
|
||||||
|
$issuer = new File_X509();
|
||||||
|
$issuer->setPrivateKey($privKey);
|
||||||
|
$issuer->setDN($subject->getDN());
|
||||||
|
|
||||||
|
$x509 = new File_X509();
|
||||||
|
|
||||||
|
$result = $x509->sign($issuer, $subject);
|
||||||
|
$cert = $x509->saveX509($result);
|
||||||
|
$cert = $x509->loadX509($cert);
|
||||||
|
|
||||||
|
$this->assertArrayHasKey('parameters', $cert['tbsCertificate']['subjectPublicKeyInfo']['algorithm']);
|
||||||
|
}
|
||||||
|
|
||||||
|
private function _encodeOID($oid)
|
||||||
{
|
{
|
||||||
if ($oid === false) {
|
if ($oid === false) {
|
||||||
user_error('Invalid OID');
|
user_error('Invalid OID');
|
||||||
|
Loading…
Reference in New Issue
Block a user