installed plugin WP-WebAuthn
version 1.2.8
This commit is contained in:
107
wp-content/plugins/wp-webauthn/vendor/web-token/jwt-signature-algorithm-eddsa/EdDSA.php
vendored
Normal file
107
wp-content/plugins/wp-webauthn/vendor/web-token/jwt-signature-algorithm-eddsa/EdDSA.php
vendored
Normal file
@ -0,0 +1,107 @@
|
||||
<?php
|
||||
|
||||
declare(strict_types=1);
|
||||
|
||||
/*
|
||||
* The MIT License (MIT)
|
||||
*
|
||||
* Copyright (c) 2014-2020 Spomky-Labs
|
||||
*
|
||||
* This software may be modified and distributed under the terms
|
||||
* of the MIT license. See the LICENSE file for details.
|
||||
*/
|
||||
|
||||
namespace Jose\Component\Signature\Algorithm;
|
||||
|
||||
use Base64Url\Base64Url;
|
||||
use function extension_loaded;
|
||||
use function in_array;
|
||||
use InvalidArgumentException;
|
||||
use Jose\Component\Core\JWK;
|
||||
use RuntimeException;
|
||||
|
||||
final class EdDSA implements SignatureAlgorithm
|
||||
{
|
||||
/**
|
||||
* EdDSA constructor.
|
||||
*
|
||||
* @throws RuntimeException if the extension "sodium" is not available
|
||||
*/
|
||||
public function __construct()
|
||||
{
|
||||
if (!extension_loaded('sodium')) {
|
||||
throw new RuntimeException('The extension "sodium" is not available. Please install it to use this method');
|
||||
}
|
||||
}
|
||||
|
||||
public function allowedKeyTypes(): array
|
||||
{
|
||||
return ['OKP'];
|
||||
}
|
||||
|
||||
/**
|
||||
* @throws InvalidArgumentException if the key is not private
|
||||
* @throws InvalidArgumentException if the curve is not supported
|
||||
*/
|
||||
public function sign(JWK $key, string $input): string
|
||||
{
|
||||
$this->checkKey($key);
|
||||
if (!$key->has('d')) {
|
||||
throw new InvalidArgumentException('The EC key is not private');
|
||||
}
|
||||
$x = Base64Url::decode($key->get('x'));
|
||||
$d = Base64Url::decode($key->get('d'));
|
||||
$secret = $d.$x;
|
||||
|
||||
switch ($key->get('crv')) {
|
||||
case 'Ed25519':
|
||||
return sodium_crypto_sign_detached($input, $secret);
|
||||
|
||||
default:
|
||||
throw new InvalidArgumentException('Unsupported curve');
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* @throws InvalidArgumentException if the curve is not supported
|
||||
*/
|
||||
public function verify(JWK $key, string $input, string $signature): bool
|
||||
{
|
||||
$this->checkKey($key);
|
||||
|
||||
$public = Base64Url::decode($key->get('x'));
|
||||
|
||||
switch ($key->get('crv')) {
|
||||
case 'Ed25519':
|
||||
return sodium_crypto_sign_verify_detached($signature, $input, $public);
|
||||
|
||||
default:
|
||||
throw new InvalidArgumentException('Unsupported curve');
|
||||
}
|
||||
}
|
||||
|
||||
public function name(): string
|
||||
{
|
||||
return 'EdDSA';
|
||||
}
|
||||
|
||||
/**
|
||||
* @throws InvalidArgumentException if the key type is not valid
|
||||
* @throws InvalidArgumentException if a mandatory key parameter is missing
|
||||
* @throws InvalidArgumentException if the curve is not suuported
|
||||
*/
|
||||
private function checkKey(JWK $key): void
|
||||
{
|
||||
if (!in_array($key->get('kty'), $this->allowedKeyTypes(), true)) {
|
||||
throw new InvalidArgumentException('Wrong key type.');
|
||||
}
|
||||
foreach (['x', 'crv'] as $k) {
|
||||
if (!$key->has($k)) {
|
||||
throw new InvalidArgumentException(sprintf('The key parameter "%s" is missing.', $k));
|
||||
}
|
||||
}
|
||||
if ('Ed25519' !== $key->get('crv')) {
|
||||
throw new InvalidArgumentException('Unsupported curve.');
|
||||
}
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user