Commit | Line | Data |
---|---|---|
6a488035 TO |
1 | <?php |
2 | /* | |
3 | +--------------------------------------------------------------------+ | |
4 | | CiviCRM version 4.3 | | |
5 | +--------------------------------------------------------------------+ | |
6 | | Copyright CiviCRM LLC (c) 2004-2013 | | |
7 | +--------------------------------------------------------------------+ | |
8 | | This file is a part of CiviCRM. | | |
9 | | | | |
10 | | CiviCRM is free software; you can copy, modify, and distribute it | | |
11 | | under the terms of the GNU Affero General Public License | | |
12 | | Version 3, 19 November 2007 and the CiviCRM Licensing Exception. | | |
13 | | | | |
14 | | CiviCRM is distributed in the hope that it will be useful, but | | |
15 | | WITHOUT ANY WARRANTY; without even the implied warranty of | | |
16 | | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. | | |
17 | | See the GNU Affero General Public License for more details. | | |
18 | | | | |
19 | | You should have received a copy of the GNU Affero General Public | | |
20 | | License and the CiviCRM Licensing Exception along | | |
21 | | with this program; if not, contact CiviCRM LLC | | |
22 | | at info[AT]civicrm[DOT]org. If you have questions about the | | |
23 | | GNU Affero General Public License or the licensing of CiviCRM, | | |
24 | | see the CiviCRM license FAQ at http://civicrm.org/licensing | | |
25 | +--------------------------------------------------------------------+ | |
26 | */ | |
27 | ||
28 | /** | |
29 | * | |
30 | * @package CRM | |
31 | * @copyright CiviCRM LLC (c) 2004-2013 | |
32 | * $Id$ | |
33 | * | |
34 | */ | |
35 | ||
36 | /** | |
37 | * A utility which signs and verifies a list of key-value pairs | |
38 | * | |
39 | * FIXME: Add TTL support? | |
40 | * | |
41 | * @code | |
42 | * $signer = new CRM_Utils_Signer('myprivatekey', array('param1','param2')); | |
43 | * $params = array( | |
44 | * 'param1' => 'hello', | |
45 | * 'param2' => 'world', | |
46 | * ); | |
47 | * $token = $signer->sign($params); | |
48 | * ... | |
49 | * assertTrue($signer->validate($token, $params)); | |
50 | * @endcode | |
51 | */ | |
52 | class CRM_Utils_Signer { | |
53 | /** | |
54 | * Expected length of the salt | |
55 | * | |
56 | * @var int | |
57 | */ | |
58 | const SALT_LEN = 4; | |
59 | ||
60 | /** | |
61 | * Instantiate a signature-processor | |
62 | * | |
63 | * @param $secret string, private | |
64 | * @param $paramNames array, fields which should be part of the signature | |
65 | */ | |
66 | function __construct($secret, $paramNames) { | |
67 | sort($paramNames); // ensure consistent serialization of payloads | |
68 | $this->secret = $secret; | |
69 | $this->paramNames = $paramNames; | |
70 | $this->signDelim = "_"; // chosen to be valid in URLs but not in salt or md5 | |
71 | $this->defaultSalt = CRM_Utils_String::createRandom(self::SALT_LEN, CRM_Utils_String::ALPHANUMERIC); | |
72 | } | |
73 | ||
74 | /** | |
75 | * Generate a signature for a set of key-value pairs | |
76 | * | |
77 | * @param $params array, key-value pairs | |
78 | * @param $salt string, the salt (if known) or NULL (for auto-generated) | |
79 | * @return string, the full public token representing the signature | |
80 | */ | |
81 | function sign($params, $salt = NULL) { | |
82 | $message = array(); | |
83 | $message['secret'] = $this->secret; | |
84 | $message['payload'] = array(); | |
85 | if (empty($salt)) { | |
86 | $message['salt'] = $this->createSalt(); | |
87 | } else { | |
88 | $message['salt'] = $salt; | |
89 | } | |
90 | // recall: paramNames is pre-sorted for stability | |
91 | foreach ($this->paramNames as $paramName) { | |
92 | if (isset($params[$paramName])) { | |
93 | if (is_numeric($params[$paramName])) { | |
94 | $params[$paramName] = (string) $params[$paramName]; | |
95 | } | |
96 | } else { // $paramName is not included or ===NULL | |
97 | $params[$paramName] = ''; | |
98 | } | |
99 | $message['payload'][$paramName] = $params[$paramName]; | |
100 | } | |
101 | $token = $message['salt'] . $this->signDelim . md5(serialize($message)); | |
102 | return $token; | |
103 | } | |
104 | ||
105 | /** | |
106 | * Determine whether a token represents a proper signature for $params | |
107 | * | |
108 | * @param $token string, the full public token representing the signature | |
109 | * @param $params array, key-value pairs | |
110 | * @return bool, TRUE iff all $paramNames for the submitted validate($params) and the original sign($params) | |
111 | */ | |
112 | function validate($token, $params) { | |
113 | list ($salt, $signature) = explode($this->signDelim, $token); | |
114 | if (strlen($salt) != self::SALT_LEN) { | |
115 | throw new Exception("Invalid salt [$token]=[$salt][$signature]"); | |
116 | } | |
117 | $newToken = $this->sign($params, $salt); | |
118 | return ($token == $newToken); | |
119 | } | |
120 | ||
121 | function createSalt() { | |
122 | // It would be more secure to generate a new value but liable to run this | |
123 | // many times on certain admin pages; so instead we'll re-use the hash. | |
124 | return $this->defaultSalt; | |
125 | } | |
126 | } |