66 public const BEDROCK_SIGNING_KEY_CURVE_NAME =
"secp384r1";
68 private const ASN1_INTEGER_TAG =
"\x02";
69 private const ASN1_SEQUENCE_TAG =
"\x30";
71 private const SIGNATURE_PART_LENGTH = 48;
72 private const SIGNATURE_ALGORITHM = OPENSSL_ALGO_SHA384;
79 public static function split(
string $jwt) : array{
82 $v = explode(
".", $jwt, limit: 4);
84 throw new JwtException(
"Expected exactly 3 JWT parts delimited by a period");
86 return [$v[0], $v[1], $v[2]];
97 public static function parse(
string $token) : array{
98 $v = self::split($token);
99 $header = json_decode(self::b64UrlDecode($v[0]),
true);
100 if(!is_array($header)){
101 throw new JwtException(
"Failed to decode JWT header JSON: " . json_last_error_msg());
103 $body = json_decode(self::b64UrlDecode($v[1]),
true);
104 if(!is_array($body)){
105 throw new JwtException(
"Failed to decode JWT payload JSON: " . json_last_error_msg());
107 $signature = self::b64UrlDecode($v[2]);
108 return [$header, $body, $signature];
111 private static function signaturePartToAsn1(
string $part) : string{
112 if(strlen($part) !== self::SIGNATURE_PART_LENGTH){
113 throw new JwtException(
"R and S for a SHA384 signature must each be exactly 48 bytes, but have " . strlen($part) .
" bytes");
115 $part = ltrim($part,
"\x00");
116 if(ord($part[0]) >= 128){
119 $part =
"\x00" . $part;
123 assert(strlen($part) <= 127);
124 return self::ASN1_INTEGER_TAG . chr(strlen($part)) . $part;
127 private static function rawSignatureToDer(
string $rawSignature) : string{
128 if(strlen($rawSignature) !== self::SIGNATURE_PART_LENGTH * 2){
129 throw new JwtException(
"JWT signature has unexpected length, expected 96, got " . strlen($rawSignature));
132 [$rString, $sString] = str_split($rawSignature, self::SIGNATURE_PART_LENGTH);
133 $sequence = self::signaturePartToAsn1($rString) . self::signaturePartToAsn1($sString);
136 assert(strlen($sequence) <= 127);
137 return self::ASN1_SEQUENCE_TAG . chr(strlen($sequence)) . $sequence;
140 private static function signaturePartFromAsn1(ByteBufferReader $stream) : string{
141 $prefix = $stream->readByteArray(1);
142 if($prefix !== self::ASN1_INTEGER_TAG){
143 throw new \InvalidArgumentException(
"Expected an ASN.1 INTEGER tag, got " . bin2hex($prefix));
146 $length = Byte::readUnsigned($stream);
147 if($length > self::SIGNATURE_PART_LENGTH + 1){
148 throw new \InvalidArgumentException(
"Expected at most 49 bytes for signature R or S, got $length");
150 $part = $stream->readByteArray($length);
151 return str_pad(ltrim($part,
"\x00"), self::SIGNATURE_PART_LENGTH,
"\x00", STR_PAD_LEFT);
154 private static function rawSignatureFromDer(
string $derSignature) : string{
155 if($derSignature[0] !== self::ASN1_SEQUENCE_TAG){
156 throw new \InvalidArgumentException(
"Invalid DER signature, expected ASN.1 SEQUENCE tag, got " . bin2hex($derSignature[0]));
160 $length = ord($derSignature[1]);
161 $parts = substr($derSignature, 2, $length);
162 if(strlen($parts) !== $length){
163 throw new \InvalidArgumentException(
"Invalid DER signature, expected $length sequence bytes, got " . strlen($parts));
166 $stream =
new ByteBufferReader($parts);
167 $rRaw = self::signaturePartFromAsn1($stream);
168 $sRaw = self::signaturePartFromAsn1($stream);
170 if($stream->getUnreadLength() > 0){
171 throw new \InvalidArgumentException(
"Invalid DER signature, unexpected trailing sequence data");
174 return $rRaw . $sRaw;
180 public static function verify(
string $jwt,
string $signingKeyDer,
bool $ec) : bool{
181 [$header, $body, $signature] = self::split($jwt);
183 $rawSignature = self::b64UrlDecode($signature);
184 $derSignature = $ec ? self::rawSignatureToDer($rawSignature) : $rawSignature;
187 $header .
'.' . $body,
189 self::parseDerPublicKey($signingKeyDer),
190 $ec ? self::SIGNATURE_ALGORITHM : OPENSSL_ALGO_SHA256
193 case 0:
return false;
195 case -1:
throw new JwtException(
"Error verifying JWT signature: " . openssl_error_string());
204 public static function create(array $header, array $claims, \OpenSSLAsymmetricKey $signingKey) : string{
205 $jwtBody =
JwtUtils::b64UrlEncode(json_encode($header, JSON_THROW_ON_ERROR)) .
"." .
JwtUtils::b64UrlEncode(json_encode($claims, JSON_THROW_ON_ERROR));
211 self::SIGNATURE_ALGORITHM
214 $rawSignature = self::rawSignatureFromDer($derSignature);
215 $jwtSig = self::b64UrlEncode($rawSignature);
217 return "$jwtBody.$jwtSig";
220 public static function b64UrlEncode(
string $str) : string{
221 return rtrim(strtr(base64_encode($str),
'+/',
'-_'),
'=');
224 public static function b64UrlDecode(
string $str) : string{
225 if(($len = strlen($str) % 4) !== 0){
226 $str .= str_repeat(
'=', 4 - $len);
228 $decoded = base64_decode(strtr($str,
'-_',
'+/'),
true);
229 if($decoded ===
false){
230 throw new JwtException(
"Malformed base64url encoded payload could not be decoded");
235 public static function emitDerPublicKey(\OpenSSLAsymmetricKey $opensslKey) : string{
236 $details = Utils::assumeNotFalse(openssl_pkey_get_details($opensslKey),
"Failed to get details from OpenSSL key resource");
238 $pemKey = $details[
'key'];
239 if(preg_match(
"@^-----BEGIN[A-Z\d ]+PUBLIC KEY-----\n([A-Za-z\d+/\n]+)\n-----END[A-Z\d ]+PUBLIC KEY-----\n$@", $pemKey, $matches) === 1){
240 $derKey = base64_decode(str_replace("\n",
"", $matches[1]),
true);
241 if($derKey !==
false){
245 throw new AssumptionFailedError(
"OpenSSL resource contains invalid public key");
254 private static function encodeDerLength(
int $length) : string{
255 if ($length <= 0x7F) {
259 $lengthBytes = ltrim(BE::packUnsignedInt($length),
"\x00");
261 assert(strlen($lengthBytes) <= 4);
262 return chr(0x80 | strlen($lengthBytes)) . $lengthBytes;
268 private static function encodeDerBytes(
int $tag,
string $data) : string{
269 return chr($tag) . self::encodeDerLength(strlen($data)) . $data;
272 public static function parseDerPublicKey(
string $derKey) : \OpenSSLAsymmetricKey{
273 $signingKeyOpenSSL = openssl_pkey_get_public(self::derPublicKeyToPem($derKey));
274 if($signingKeyOpenSSL ===
false){
275 throw new JwtException(
"OpenSSL failed to parse key: " . openssl_error_string());
277 return $signingKeyOpenSSL;
280 public static function derPublicKeyToPem(
string $derKey) : string{
281 return sprintf(
"-----BEGIN PUBLIC KEY-----\n%s\n-----END PUBLIC KEY-----\n", base64_encode($derKey));
291 $mod = self::b64UrlDecode($nBase64);
292 $exp = self::b64UrlDecode($eBase64);
294 $modulus = self::encodeDerBytes(2, $mod);
295 $publicExponent = self::encodeDerBytes(2, $exp);
297 $rsaPublicKey = self::encodeDerBytes(48, $modulus . $publicExponent);
300 $rsaOID = hex2bin(
'300d06092a864886f70d0101010500');
301 $rsaPublicKey = chr(0) . $rsaPublicKey;
302 $rsaPublicKey = self::encodeDerBytes(3, $rsaPublicKey);
304 return self::encodeDerBytes(48, $rsaOID . $rsaPublicKey);