| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package Crypt::OpenToken; |
|
2
|
|
|
|
|
|
|
|
|
3
|
6
|
|
|
6
|
|
740522
|
use Moose; |
|
|
6
|
|
|
|
|
2957824
|
|
|
|
6
|
|
|
|
|
47
|
|
|
4
|
6
|
|
|
6
|
|
50830
|
use Fcntl qw(); |
|
|
6
|
|
|
|
|
15
|
|
|
|
6
|
|
|
|
|
134
|
|
|
5
|
6
|
|
|
6
|
|
31
|
use Carp qw(croak); |
|
|
6
|
|
|
|
|
11
|
|
|
|
6
|
|
|
|
|
467
|
|
|
6
|
6
|
|
|
6
|
|
1528
|
use MIME::Base64 qw(encode_base64 decode_base64); |
|
|
6
|
|
|
|
|
1550
|
|
|
|
6
|
|
|
|
|
755
|
|
|
7
|
6
|
|
|
6
|
|
4760
|
use Compress::Zlib; |
|
|
6
|
|
|
|
|
404764
|
|
|
|
6
|
|
|
|
|
1399
|
|
|
8
|
6
|
|
|
6
|
|
3264
|
use Digest::SHA1; |
|
|
6
|
|
|
|
|
4408
|
|
|
|
6
|
|
|
|
|
276
|
|
|
9
|
6
|
|
|
6
|
|
2909
|
use Digest::HMAC_SHA1; |
|
|
6
|
|
|
|
|
29149
|
|
|
|
6
|
|
|
|
|
300
|
|
|
10
|
6
|
|
|
6
|
|
1384
|
use Data::Dumper qw(Dumper); |
|
|
6
|
|
|
|
|
12995
|
|
|
|
6
|
|
|
|
|
333
|
|
|
11
|
6
|
|
|
6
|
|
2849
|
use Crypt::OpenToken::KeyGenerator; |
|
|
6
|
|
|
|
|
19
|
|
|
|
6
|
|
|
|
|
196
|
|
|
12
|
6
|
|
|
6
|
|
2611
|
use Crypt::OpenToken::Serializer; |
|
|
6
|
|
|
|
|
17
|
|
|
|
6
|
|
|
|
|
196
|
|
|
13
|
6
|
|
|
6
|
|
2658
|
use Crypt::OpenToken::Token; |
|
|
6
|
|
|
|
|
22
|
|
|
|
6
|
|
|
|
|
719
|
|
|
14
|
|
|
|
|
|
|
|
|
15
|
|
|
|
|
|
|
our $VERSION = '0.08'; |
|
16
|
|
|
|
|
|
|
our $DEBUG = 0; |
|
17
|
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
# shared encryption password |
|
19
|
|
|
|
|
|
|
has 'password' => ( |
|
20
|
|
|
|
|
|
|
is => 'rw', |
|
21
|
|
|
|
|
|
|
isa => 'Str', |
|
22
|
|
|
|
|
|
|
required => 1, |
|
23
|
|
|
|
|
|
|
); |
|
24
|
|
|
|
|
|
|
|
|
25
|
|
|
|
|
|
|
# http://tools.ietf.org/html/draft-smith-opentoken-02 |
|
26
|
6
|
|
|
|
|
398
|
use constant TOKEN_PACK => |
|
27
|
|
|
|
|
|
|
'a3'. # literal 'OTK' |
|
28
|
|
|
|
|
|
|
'C'. # version (unsigned-byte) |
|
29
|
|
|
|
|
|
|
'C'. # cipher |
|
30
|
|
|
|
|
|
|
'a20'. # hmac string (20 bytes for SHA1/SHA1_HMAC) |
|
31
|
|
|
|
|
|
|
'C/a*'. # IV (with unsigned-byte length-prefix) |
|
32
|
|
|
|
|
|
|
'C/a*'. # key (with unsigned-byte length-prefix) |
|
33
|
6
|
|
|
6
|
|
62
|
'n/a*'; # payload (with network-endian short length-prefix) |
|
|
6
|
|
|
|
|
11
|
|
|
34
|
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
# List of ciphers supported by OpenToken |
|
36
|
6
|
|
|
6
|
|
39
|
use constant CIPHER_NULL => 0; |
|
|
6
|
|
|
|
|
11
|
|
|
|
6
|
|
|
|
|
310
|
|
|
37
|
6
|
|
|
6
|
|
35
|
use constant CIPHER_AES256 => 1; |
|
|
6
|
|
|
|
|
15
|
|
|
|
6
|
|
|
|
|
254
|
|
|
38
|
6
|
|
|
6
|
|
34
|
use constant CIPHER_AES128 => 2; |
|
|
6
|
|
|
|
|
10
|
|
|
|
6
|
|
|
|
|
297
|
|
|
39
|
6
|
|
|
6
|
|
48
|
use constant CIPHER_DES3 => 3; |
|
|
6
|
|
|
|
|
14
|
|
|
|
6
|
|
|
|
|
325
|
|
|
40
|
6
|
|
|
6
|
|
35
|
use constant CIPHERS => [qw(null AES256 AES128 DES3)]; |
|
|
6
|
|
|
|
|
12
|
|
|
|
6
|
|
|
|
|
6201
|
|
|
41
|
|
|
|
|
|
|
|
|
42
|
|
|
|
|
|
|
sub _cipher { |
|
43
|
16
|
|
|
16
|
|
39
|
my ($self, $cipher) = @_; |
|
44
|
|
|
|
|
|
|
|
|
45
|
16
|
|
|
|
|
43
|
my $impl = CIPHERS->[$cipher]; |
|
46
|
16
|
100
|
|
|
|
66
|
croak "unsupported OTK cipher; '$cipher'" unless ($impl); |
|
47
|
|
|
|
|
|
|
|
|
48
|
15
|
|
|
|
|
47
|
my $mod = "Crypt::OpenToken::Cipher::$impl"; |
|
49
|
15
|
|
|
|
|
1106
|
eval "require $mod"; |
|
50
|
15
|
50
|
|
|
|
80
|
if ($@) { |
|
51
|
0
|
|
|
|
|
0
|
croak "unable to load cipher '$impl'; $@"; |
|
52
|
|
|
|
|
|
|
} |
|
53
|
15
|
50
|
|
|
|
49
|
print "selected cipher: $impl\n" if $DEBUG; |
|
54
|
15
|
|
|
|
|
84
|
return $mod->new; |
|
55
|
|
|
|
|
|
|
} |
|
56
|
|
|
|
|
|
|
|
|
57
|
|
|
|
|
|
|
sub parse { |
|
58
|
10
|
|
|
10
|
1
|
22872
|
my ($self, $token_str) = @_; |
|
59
|
10
|
50
|
|
|
|
39
|
print "parsing token: $token_str\n" if $DEBUG; |
|
60
|
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
# base64 decode the OTK |
|
62
|
10
|
|
|
|
|
64
|
$token_str = $self->_base64_decode($token_str); |
|
63
|
|
|
|
|
|
|
|
|
64
|
|
|
|
|
|
|
# unpack the OTK token into its component fields |
|
65
|
10
|
|
|
|
|
53
|
my $fields = $self->_unpack($token_str); |
|
66
|
10
|
50
|
|
|
|
41
|
print "unpacked fields: " . Dumper($fields) if $DEBUG; |
|
67
|
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
# get the chosen cipher, and make sure the IV length is valid |
|
69
|
10
|
|
|
|
|
45
|
my $cipher = $self->_cipher( $fields->{cipher} ); |
|
70
|
10
|
|
|
|
|
2518
|
my $iv_len = $fields->{iv_len}; |
|
71
|
10
|
50
|
|
|
|
40
|
unless ($iv_len == $cipher->iv_len) { |
|
72
|
0
|
|
|
|
|
0
|
croak "invalid IV length ($iv_len) for selected cipher ($cipher)"; |
|
73
|
|
|
|
|
|
|
} |
|
74
|
|
|
|
|
|
|
|
|
75
|
|
|
|
|
|
|
# generate a decryption key for this cipher |
|
76
|
10
|
|
|
|
|
347
|
my $key = Crypt::OpenToken::KeyGenerator::generate( |
|
77
|
|
|
|
|
|
|
$self->password, $cipher->keysize, |
|
78
|
|
|
|
|
|
|
); |
|
79
|
10
|
50
|
|
|
|
67
|
print "generated key: " . encode_base64($key) if $DEBUG; |
|
80
|
|
|
|
|
|
|
|
|
81
|
|
|
|
|
|
|
# decrypt the payload |
|
82
|
10
|
|
|
|
|
54
|
my $crypto = $cipher->cipher($key, $fields->{iv}); |
|
83
|
10
|
|
|
|
|
73
|
my $decrypted = $crypto->decrypt($fields->{payload}); |
|
84
|
10
|
50
|
|
|
|
681
|
print "decrypted payload: " . encode_base64($decrypted) if $DEBUG; |
|
85
|
|
|
|
|
|
|
|
|
86
|
|
|
|
|
|
|
# uncompress the payload |
|
87
|
10
|
|
|
|
|
50
|
my $plaintext = Compress::Zlib::uncompress($decrypted); |
|
88
|
10
|
50
|
|
|
|
1095
|
print "plaintext:\n$plaintext\n" if $DEBUG; |
|
89
|
|
|
|
|
|
|
|
|
90
|
|
|
|
|
|
|
# verify the HMAC |
|
91
|
10
|
|
|
|
|
54
|
my $hmac = $self->_create_hmac($key, $fields, $plaintext); |
|
92
|
10
|
50
|
|
|
|
239
|
unless ($hmac eq $fields->{hmac}) { |
|
93
|
0
|
|
|
|
|
0
|
croak "invalid HMAC"; |
|
94
|
|
|
|
|
|
|
} |
|
95
|
|
|
|
|
|
|
|
|
96
|
|
|
|
|
|
|
# deserialize the plaintext payload |
|
97
|
10
|
|
|
|
|
44
|
my %params = Crypt::OpenToken::Serializer::thaw($plaintext); |
|
98
|
10
|
50
|
|
|
|
45
|
print "payload: " . Dumper(\%params) if $DEBUG; |
|
99
|
10
|
|
|
|
|
45
|
$fields->{data} = \%params; |
|
100
|
|
|
|
|
|
|
|
|
101
|
|
|
|
|
|
|
# instantiate the token object |
|
102
|
10
|
|
|
|
|
100
|
my $token = Crypt::OpenToken::Token->new($fields); |
|
103
|
10
|
|
|
|
|
16230
|
return $token; |
|
104
|
|
|
|
|
|
|
} |
|
105
|
|
|
|
|
|
|
|
|
106
|
|
|
|
|
|
|
sub create { |
|
107
|
6
|
|
|
6
|
1
|
13614
|
my ($self, $cipher, $data) = @_; |
|
108
|
|
|
|
|
|
|
|
|
109
|
|
|
|
|
|
|
# get the chosen cipher, and generate a random IV for the encryption |
|
110
|
6
|
|
|
|
|
32
|
my $cipher_obj = $self->_cipher($cipher); |
|
111
|
5
|
|
|
|
|
994
|
my $iv = ''; |
|
112
|
5
|
100
|
|
|
|
22
|
if (my $len = $cipher_obj->iv_len) { |
|
113
|
4
|
|
|
|
|
16
|
$iv = _rand_iv($len); |
|
114
|
|
|
|
|
|
|
} |
|
115
|
|
|
|
|
|
|
|
|
116
|
|
|
|
|
|
|
# generate an encryption key for this cipher |
|
117
|
5
|
|
|
|
|
189
|
my $key = Crypt::OpenToken::KeyGenerator::generate( |
|
118
|
|
|
|
|
|
|
$self->password, $cipher_obj->keysize, |
|
119
|
|
|
|
|
|
|
); |
|
120
|
5
|
50
|
|
|
|
29
|
print "generated key: " . encode_base64($key) if $DEBUG; |
|
121
|
|
|
|
|
|
|
|
|
122
|
|
|
|
|
|
|
# serialize the data into a payload |
|
123
|
5
|
|
|
|
|
12
|
my $plaintext = Crypt::OpenToken::Serializer::freeze(%{$data}); |
|
|
5
|
|
|
|
|
40
|
|
|
124
|
5
|
50
|
|
|
|
25
|
print "plaintext:\n$plaintext\n" if $DEBUG; |
|
125
|
|
|
|
|
|
|
|
|
126
|
|
|
|
|
|
|
# compress the payload |
|
127
|
5
|
|
|
|
|
30
|
my $compressed = Compress::Zlib::compress($plaintext); |
|
128
|
5
|
50
|
|
|
|
2065
|
print "compressed plaintext: " . encode_base64($compressed) if $DEBUG; |
|
129
|
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
# encrypt the token, w/PKCS5 padding |
|
131
|
5
|
|
|
|
|
41
|
my $crypto = $cipher_obj->cipher($key, $iv); |
|
132
|
5
|
|
|
|
|
37
|
my $padded = $self->_pkcs5_padded($compressed, $crypto->blocksize()); |
|
133
|
5
|
|
|
|
|
41
|
my $encrypted = $crypto->encrypt($padded); |
|
134
|
5
|
50
|
|
|
|
423
|
print "encrypted payload: " . encode_base64($encrypted) if $DEBUG; |
|
135
|
|
|
|
|
|
|
|
|
136
|
|
|
|
|
|
|
# gather up all of the fields |
|
137
|
5
|
|
|
|
|
22
|
my %fields = ( |
|
138
|
|
|
|
|
|
|
version => 1, |
|
139
|
|
|
|
|
|
|
cipher => $cipher, |
|
140
|
|
|
|
|
|
|
iv_len => bytes::length($iv), |
|
141
|
|
|
|
|
|
|
iv => $iv, |
|
142
|
|
|
|
|
|
|
key_len => bytes::length($key), |
|
143
|
|
|
|
|
|
|
key => $key, |
|
144
|
|
|
|
|
|
|
payload_len => bytes::length($encrypted), |
|
145
|
|
|
|
|
|
|
payload => $encrypted, |
|
146
|
|
|
|
|
|
|
); |
|
147
|
|
|
|
|
|
|
|
|
148
|
|
|
|
|
|
|
# create an HMAC |
|
149
|
5
|
|
|
|
|
71
|
my $hmac = $self->_create_hmac($key, \%fields, $plaintext); |
|
150
|
5
|
50
|
|
|
|
122
|
print "calculated hmac: " . encode_base64($hmac) if $DEBUG; |
|
151
|
5
|
|
|
|
|
16
|
$fields{hmac} = $hmac; |
|
152
|
|
|
|
|
|
|
|
|
153
|
|
|
|
|
|
|
# pack the OTK token together from its component fields |
|
154
|
5
|
|
|
|
|
49
|
my $token = $self->_pack(%fields); |
|
155
|
5
|
50
|
|
|
|
22
|
print "binary token: $token\n" if $DEBUG; |
|
156
|
|
|
|
|
|
|
|
|
157
|
|
|
|
|
|
|
# base64 encode the token |
|
158
|
5
|
|
|
|
|
24
|
my $token_str = $self->_base64_encode($token); |
|
159
|
5
|
50
|
|
|
|
20
|
print "token created: $token_str\n" if $DEBUG; |
|
160
|
5
|
|
|
|
|
48
|
return $token_str; |
|
161
|
|
|
|
|
|
|
} |
|
162
|
|
|
|
|
|
|
|
|
163
|
|
|
|
|
|
|
sub _rand_iv { |
|
164
|
4
|
|
|
4
|
|
10
|
my $len = shift; |
|
165
|
4
|
|
|
|
|
9
|
my $iv = ''; |
|
166
|
6
|
|
|
6
|
|
56
|
use bytes; |
|
|
6
|
|
|
|
|
13
|
|
|
|
6
|
|
|
|
|
52
|
|
|
167
|
|
|
|
|
|
|
|
|
168
|
|
|
|
|
|
|
# try to use a reasonably unguessable source of random bytes. |
|
169
|
|
|
|
|
|
|
# /dev/random isn't needed for IVs in general. |
|
170
|
4
|
|
|
|
|
10
|
eval { |
|
171
|
4
|
50
|
|
|
|
261
|
sysopen my $urand, '/dev/urandom', Fcntl::O_RDONLY() or die $!; |
|
172
|
4
|
50
|
|
|
|
32
|
binmode $urand or die $!; |
|
173
|
4
|
50
|
|
|
|
126
|
sysread $urand, $iv, $len or die $!; |
|
174
|
|
|
|
|
|
|
}; |
|
175
|
4
|
50
|
|
|
|
30
|
warn __PACKAGE__."::_rand_iv can't use /dev/urandom: $@" if $@; |
|
176
|
|
|
|
|
|
|
|
|
177
|
|
|
|
|
|
|
# fill up with less random bytes |
|
178
|
4
|
50
|
|
|
|
22
|
if (length($iv) < $len) { |
|
179
|
0
|
|
|
|
|
0
|
$iv .= chr(int(rand(256))) until (length($iv) == $len); |
|
180
|
|
|
|
|
|
|
} |
|
181
|
|
|
|
|
|
|
|
|
182
|
4
|
|
|
|
|
15
|
return $iv; |
|
183
|
|
|
|
|
|
|
} |
|
184
|
|
|
|
|
|
|
|
|
185
|
|
|
|
|
|
|
sub _pkcs5_padded { |
|
186
|
5
|
|
|
5
|
|
23
|
my ($self, $data, $bsize) = @_; |
|
187
|
5
|
50
|
|
|
|
17
|
if ($bsize) { |
|
188
|
5
|
|
|
|
|
45
|
my $data_len = bytes::length($data); |
|
189
|
5
|
|
|
|
|
3957
|
my $pad_needed = $bsize - ($data_len % $bsize); |
|
190
|
5
|
|
|
|
|
30
|
$data .= chr($pad_needed) x $pad_needed; |
|
191
|
|
|
|
|
|
|
} |
|
192
|
5
|
|
|
|
|
18
|
return $data; |
|
193
|
|
|
|
|
|
|
} |
|
194
|
|
|
|
|
|
|
|
|
195
|
|
|
|
|
|
|
sub _create_hmac { |
|
196
|
15
|
|
|
15
|
|
47
|
my ($self, $key, $fields, $plaintext) = @_; |
|
197
|
|
|
|
|
|
|
|
|
198
|
|
|
|
|
|
|
# NULL cipher uses SHA1 digest, all other ciphers use an HMAC_SHA1 |
|
199
|
|
|
|
|
|
|
my $digest = |
|
200
|
15
|
100
|
|
|
|
95
|
($fields->{cipher} == CIPHER_NULL) |
|
201
|
|
|
|
|
|
|
? Digest::SHA1->new() |
|
202
|
|
|
|
|
|
|
: Digest::HMAC_SHA1->new($key); |
|
203
|
|
|
|
|
|
|
|
|
204
|
15
|
|
|
|
|
901
|
$digest->add(chr($fields->{version})); |
|
205
|
15
|
|
|
|
|
129
|
$digest->add(chr($fields->{cipher})); |
|
206
|
15
|
100
|
|
|
|
129
|
$digest->add($fields->{iv}) if ($fields->{iv_len} > 0); |
|
207
|
15
|
100
|
|
|
|
114
|
$digest->add($fields->{key}) if ($fields->{key_len} > 0); |
|
208
|
15
|
|
|
|
|
78
|
$digest->add($plaintext); |
|
209
|
|
|
|
|
|
|
|
|
210
|
15
|
|
|
|
|
108
|
return $digest->digest; |
|
211
|
|
|
|
|
|
|
} |
|
212
|
|
|
|
|
|
|
|
|
213
|
|
|
|
|
|
|
sub _unpack { |
|
214
|
10
|
|
|
10
|
|
30
|
my ($self, $token_str) = @_; |
|
215
|
6
|
|
|
6
|
|
2273
|
use bytes; |
|
|
6
|
|
|
|
|
31
|
|
|
|
6
|
|
|
|
|
58
|
|
|
216
|
|
|
|
|
|
|
|
|
217
|
10
|
|
|
|
|
119
|
my ($otk, $ver, $cipher, $hmac, $iv, $key, $payload) |
|
218
|
|
|
|
|
|
|
= unpack(TOKEN_PACK, $token_str); |
|
219
|
10
|
50
|
|
|
|
55
|
unless ($otk eq 'OTK') { |
|
220
|
0
|
|
|
|
|
0
|
croak "invalid literal identifier in OTK; '$otk'"; |
|
221
|
|
|
|
|
|
|
} |
|
222
|
10
|
50
|
|
|
|
37
|
unless ($ver == 1) { |
|
223
|
0
|
|
|
|
|
0
|
croak "unsupported OTK version; '$ver'"; |
|
224
|
|
|
|
|
|
|
} |
|
225
|
|
|
|
|
|
|
|
|
226
|
|
|
|
|
|
|
return { |
|
227
|
10
|
|
|
|
|
117
|
version => $ver, |
|
228
|
|
|
|
|
|
|
cipher => $cipher, |
|
229
|
|
|
|
|
|
|
hmac => $hmac, |
|
230
|
|
|
|
|
|
|
iv_len => length($iv), |
|
231
|
|
|
|
|
|
|
iv => $iv, |
|
232
|
|
|
|
|
|
|
key_len => length($key), |
|
233
|
|
|
|
|
|
|
key => $key, |
|
234
|
|
|
|
|
|
|
payload_len => length($payload), |
|
235
|
|
|
|
|
|
|
payload => $payload, |
|
236
|
|
|
|
|
|
|
}; |
|
237
|
|
|
|
|
|
|
} |
|
238
|
|
|
|
|
|
|
|
|
239
|
|
|
|
|
|
|
sub _pack { |
|
240
|
5
|
|
|
5
|
|
34
|
my ($self, %fields) = @_; |
|
241
|
|
|
|
|
|
|
|
|
242
|
|
|
|
|
|
|
# truncate to specified lengths |
|
243
|
5
|
|
|
|
|
18
|
for (qw(iv key payload)) { |
|
244
|
15
|
|
|
|
|
49
|
substr($fields{$_}, $fields{ $_ . "_len" }) = ''; |
|
245
|
|
|
|
|
|
|
} |
|
246
|
|
|
|
|
|
|
|
|
247
|
|
|
|
|
|
|
my $token_str = pack(TOKEN_PACK, |
|
248
|
5
|
|
|
|
|
53
|
'OTK', @fields{qw(version cipher hmac iv key payload)} |
|
249
|
|
|
|
|
|
|
); |
|
250
|
5
|
|
|
|
|
26
|
return $token_str; |
|
251
|
|
|
|
|
|
|
} |
|
252
|
|
|
|
|
|
|
|
|
253
|
|
|
|
|
|
|
# Custom Base64 decoding; OTK has some oddities in how they encode things |
|
254
|
|
|
|
|
|
|
# using Base64. |
|
255
|
|
|
|
|
|
|
sub _base64_decode { |
|
256
|
11
|
|
|
11
|
|
107027
|
my ($self, $token_str) = @_; |
|
257
|
|
|
|
|
|
|
|
|
258
|
|
|
|
|
|
|
# fixup: convert trailing "*"s into "="s (OTK specific encoding) |
|
259
|
11
|
|
|
|
|
74
|
$token_str =~ s/(\*+)$/'=' x length($1)/e; |
|
|
10
|
|
|
|
|
59
|
|
|
260
|
|
|
|
|
|
|
|
|
261
|
|
|
|
|
|
|
# fixup: convert "_" to "/" (PingId PHP bindings encode this way) |
|
262
|
|
|
|
|
|
|
# fixup: convert "-" to "+" (PingId PHP bindings encode this way) |
|
263
|
11
|
|
|
|
|
43
|
$token_str =~ tr{_-}{/+}; |
|
264
|
|
|
|
|
|
|
|
|
265
|
|
|
|
|
|
|
# Base64 decode it, and we're done. |
|
266
|
11
|
|
|
|
|
62
|
my $decoded = decode_base64($token_str); |
|
267
|
11
|
|
|
|
|
34
|
return $decoded; |
|
268
|
|
|
|
|
|
|
} |
|
269
|
|
|
|
|
|
|
|
|
270
|
|
|
|
|
|
|
# Custom Base64 encoding; OTK has some oddities in how they encode things |
|
271
|
|
|
|
|
|
|
# using Base64. |
|
272
|
|
|
|
|
|
|
sub _base64_encode { |
|
273
|
6
|
|
|
6
|
|
20
|
my ($self, $token_str) = @_; |
|
274
|
|
|
|
|
|
|
|
|
275
|
|
|
|
|
|
|
# Base64 encode the token string |
|
276
|
6
|
|
|
|
|
37
|
my $encoded = encode_base64($token_str, ''); |
|
277
|
|
|
|
|
|
|
|
|
278
|
|
|
|
|
|
|
# fixup: convert "+" to "-" (PingId PHP bindings encode this way) |
|
279
|
|
|
|
|
|
|
# fixup: convert "/" to "_" (PingId PHP bindings encode this way) |
|
280
|
6
|
|
|
|
|
19
|
$encoded =~ tr{/+}{_-}; |
|
281
|
|
|
|
|
|
|
|
|
282
|
|
|
|
|
|
|
# fixup: convert trailing "="s to "*"s (OTK specific encoding) |
|
283
|
6
|
|
|
|
|
48
|
$encoded =~ s/(\=+)$/'*' x length($1)/e; |
|
|
5
|
|
|
|
|
27
|
|
|
284
|
|
|
|
|
|
|
|
|
285
|
6
|
|
|
|
|
29
|
return $encoded; |
|
286
|
|
|
|
|
|
|
} |
|
287
|
|
|
|
|
|
|
|
|
288
|
6
|
|
|
6
|
|
3031
|
no Moose; |
|
|
6
|
|
|
|
|
15
|
|
|
|
6
|
|
|
|
|
40
|
|
|
289
|
|
|
|
|
|
|
|
|
290
|
|
|
|
|
|
|
1; |
|
291
|
|
|
|
|
|
|
|
|
292
|
|
|
|
|
|
|
=head1 NAME |
|
293
|
|
|
|
|
|
|
|
|
294
|
|
|
|
|
|
|
Crypt::OpenToken - Perl implementation of Ping Identity's "OpenToken" |
|
295
|
|
|
|
|
|
|
|
|
296
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
297
|
|
|
|
|
|
|
|
|
298
|
|
|
|
|
|
|
use Crypt::OpenToken; |
|
299
|
|
|
|
|
|
|
|
|
300
|
|
|
|
|
|
|
$data = { |
|
301
|
|
|
|
|
|
|
foo => 'bar', |
|
302
|
|
|
|
|
|
|
bar => 'baz', |
|
303
|
|
|
|
|
|
|
}; |
|
304
|
|
|
|
|
|
|
|
|
305
|
|
|
|
|
|
|
# create an OpenToken factory based on a given shared password |
|
306
|
|
|
|
|
|
|
$factory = Crypt::OpenToken->new($password); |
|
307
|
|
|
|
|
|
|
|
|
308
|
|
|
|
|
|
|
# encrypt a hash-ref of data into an OpenToken. |
|
309
|
|
|
|
|
|
|
$token_str = $factory->create( |
|
310
|
|
|
|
|
|
|
Crypt::OpenToken::CIPHER_AES128, |
|
311
|
|
|
|
|
|
|
$data, |
|
312
|
|
|
|
|
|
|
); |
|
313
|
|
|
|
|
|
|
|
|
314
|
|
|
|
|
|
|
# decrypt an OpenToken, check if its valid, and get data back out |
|
315
|
|
|
|
|
|
|
$token = $factory->parse($token_str); |
|
316
|
|
|
|
|
|
|
if ($token->is_valid) { |
|
317
|
|
|
|
|
|
|
$data = $token->data(); |
|
318
|
|
|
|
|
|
|
} |
|
319
|
|
|
|
|
|
|
|
|
320
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
321
|
|
|
|
|
|
|
|
|
322
|
|
|
|
|
|
|
This module provides a Perl implementation of the "OpenToken" standard as |
|
323
|
|
|
|
|
|
|
defined by Ping Identity in their IETF Draft. |
|
324
|
|
|
|
|
|
|
|
|
325
|
|
|
|
|
|
|
=head1 METHODS |
|
326
|
|
|
|
|
|
|
|
|
327
|
|
|
|
|
|
|
=over |
|
328
|
|
|
|
|
|
|
|
|
329
|
|
|
|
|
|
|
=item Crypt::OpenToken->new($password) |
|
330
|
|
|
|
|
|
|
|
|
331
|
|
|
|
|
|
|
Instantiates a new OpenToken factory, which can encrypt/decrypt OpenTokens |
|
332
|
|
|
|
|
|
|
using the specified shared C<$password>. |
|
333
|
|
|
|
|
|
|
|
|
334
|
|
|
|
|
|
|
=item $factory->create($cipher, $data) |
|
335
|
|
|
|
|
|
|
|
|
336
|
|
|
|
|
|
|
Encrypts the given hash-ref of C<$data> using the specified C<$cipher> (which |
|
337
|
|
|
|
|
|
|
should be one of the C<CIPHER_*> constants). |
|
338
|
|
|
|
|
|
|
|
|
339
|
|
|
|
|
|
|
Returns back to the caller a Base64 encoded string which represents the |
|
340
|
|
|
|
|
|
|
OpenToken. |
|
341
|
|
|
|
|
|
|
|
|
342
|
|
|
|
|
|
|
B<NOTE:> during the encryption of the OpenToken, a random Initialization |
|
343
|
|
|
|
|
|
|
Vector will be selected; as such it is I<not> possible to encrypt the same |
|
344
|
|
|
|
|
|
|
data more than once and get the same OpenToken back. |
|
345
|
|
|
|
|
|
|
|
|
346
|
|
|
|
|
|
|
=item $factory->parse($token) |
|
347
|
|
|
|
|
|
|
|
|
348
|
|
|
|
|
|
|
Decrypts a Base64 encoded OpenToken, returning a C<Crypt::OpenToken::Token> |
|
349
|
|
|
|
|
|
|
object back to the caller. Throws a fatal exception in the event of an error. |
|
350
|
|
|
|
|
|
|
|
|
351
|
|
|
|
|
|
|
It is the callers responsibility to then check to see if the token itself is |
|
352
|
|
|
|
|
|
|
valid (see L<Crypt::OpenToken::Token> for details). |
|
353
|
|
|
|
|
|
|
|
|
354
|
|
|
|
|
|
|
=back |
|
355
|
|
|
|
|
|
|
|
|
356
|
|
|
|
|
|
|
=head1 CONSTANTS |
|
357
|
|
|
|
|
|
|
|
|
358
|
|
|
|
|
|
|
The following constant values are available for selecting an encrytion cipher |
|
359
|
|
|
|
|
|
|
to use: |
|
360
|
|
|
|
|
|
|
|
|
361
|
|
|
|
|
|
|
=over |
|
362
|
|
|
|
|
|
|
|
|
363
|
|
|
|
|
|
|
=item Crypt::OpenToken::CIPHER_NULL |
|
364
|
|
|
|
|
|
|
|
|
365
|
|
|
|
|
|
|
"Null" encryption (e.g. no encryption whatsoever). Requires C<Crypt::NULL>. |
|
366
|
|
|
|
|
|
|
|
|
367
|
|
|
|
|
|
|
=item Crypt::OpenToken::CIPHER_AES256 |
|
368
|
|
|
|
|
|
|
|
|
369
|
|
|
|
|
|
|
"AES" encryption, 256-bit. Requires C<Crypt::Rijndael>. |
|
370
|
|
|
|
|
|
|
|
|
371
|
|
|
|
|
|
|
=item Crypt::OpenToken::CIPHER_AES128 |
|
372
|
|
|
|
|
|
|
|
|
373
|
|
|
|
|
|
|
"AES" encryption, 128-bit. Requires C<Crypt::Rijndael>. |
|
374
|
|
|
|
|
|
|
|
|
375
|
|
|
|
|
|
|
=item Crypt::OpenToken::CIPHER_DES3 |
|
376
|
|
|
|
|
|
|
|
|
377
|
|
|
|
|
|
|
"TripleDES" encryption, 168-bit. Requires C<Crypt::DES>. |
|
378
|
|
|
|
|
|
|
|
|
379
|
|
|
|
|
|
|
=back |
|
380
|
|
|
|
|
|
|
|
|
381
|
|
|
|
|
|
|
=for Pod::Coverage CIPHERS TOKEN_PACK |
|
382
|
|
|
|
|
|
|
|
|
383
|
|
|
|
|
|
|
=head1 CAVEATS |
|
384
|
|
|
|
|
|
|
|
|
385
|
|
|
|
|
|
|
=over |
|
386
|
|
|
|
|
|
|
|
|
387
|
|
|
|
|
|
|
=item * |
|
388
|
|
|
|
|
|
|
|
|
389
|
|
|
|
|
|
|
This module does not (yet) support the "obfuscate password" option that is |
|
390
|
|
|
|
|
|
|
configurable within PingFederate's OpenToken adapter. |
|
391
|
|
|
|
|
|
|
|
|
392
|
|
|
|
|
|
|
=back |
|
393
|
|
|
|
|
|
|
|
|
394
|
|
|
|
|
|
|
=head1 AUTHOR |
|
395
|
|
|
|
|
|
|
|
|
396
|
|
|
|
|
|
|
Graham TerMarsch (cpan@howlingfrog.com) |
|
397
|
|
|
|
|
|
|
|
|
398
|
|
|
|
|
|
|
Shawn Devlin (shawn.devlin@socialtext.com) |
|
399
|
|
|
|
|
|
|
|
|
400
|
|
|
|
|
|
|
=head2 Contributors |
|
401
|
|
|
|
|
|
|
|
|
402
|
|
|
|
|
|
|
Thanks to those who have provided feedback, comments, and patches: |
|
403
|
|
|
|
|
|
|
|
|
404
|
|
|
|
|
|
|
Jeremy Stashewsky |
|
405
|
|
|
|
|
|
|
Travis Spencer |
|
406
|
|
|
|
|
|
|
|
|
407
|
|
|
|
|
|
|
=head2 Sponsors |
|
408
|
|
|
|
|
|
|
|
|
409
|
|
|
|
|
|
|
B<BIG> thanks also go out to those who sponsored C<Crypt::OpenToken>: |
|
410
|
|
|
|
|
|
|
|
|
411
|
|
|
|
|
|
|
=over |
|
412
|
|
|
|
|
|
|
|
|
413
|
|
|
|
|
|
|
=item Socialtext |
|
414
|
|
|
|
|
|
|
|
|
415
|
|
|
|
|
|
|
Thanks for sponsoring the initial development of C<Crypt::OpenToken>, and then |
|
416
|
|
|
|
|
|
|
being willing to release it to the world. |
|
417
|
|
|
|
|
|
|
|
|
418
|
|
|
|
|
|
|
=item Ping Identity |
|
419
|
|
|
|
|
|
|
|
|
420
|
|
|
|
|
|
|
Thanks for your assistance during the initial development, providing feedback |
|
421
|
|
|
|
|
|
|
along the way, and answering our questions as they arose. |
|
422
|
|
|
|
|
|
|
|
|
423
|
|
|
|
|
|
|
=back |
|
424
|
|
|
|
|
|
|
|
|
425
|
|
|
|
|
|
|
=head1 COPYRIGHT & LICENSE |
|
426
|
|
|
|
|
|
|
|
|
427
|
|
|
|
|
|
|
=head2 Crypt::OpenToken |
|
428
|
|
|
|
|
|
|
|
|
429
|
|
|
|
|
|
|
C<Crypt::OpenToken> is Copyright (C) 2010, Socialtext, and is released under |
|
430
|
|
|
|
|
|
|
the Artistic-2.0 license. |
|
431
|
|
|
|
|
|
|
|
|
432
|
|
|
|
|
|
|
=head2 OpenToken specification |
|
433
|
|
|
|
|
|
|
|
|
434
|
|
|
|
|
|
|
The OpenToken specification is Copyright (C) 2007-2010 Ping Identity |
|
435
|
|
|
|
|
|
|
Corporation, and released under the MIT License: |
|
436
|
|
|
|
|
|
|
|
|
437
|
|
|
|
|
|
|
=over |
|
438
|
|
|
|
|
|
|
|
|
439
|
|
|
|
|
|
|
Permission is hereby granted, free of charge, to any person obtaining a copy |
|
440
|
|
|
|
|
|
|
of this software and associated documentation files (the "Software"), to deal |
|
441
|
|
|
|
|
|
|
in the Software without restriction, including without limitation the rights |
|
442
|
|
|
|
|
|
|
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell |
|
443
|
|
|
|
|
|
|
copies of the Software, and to permit persons to whom the Software is |
|
444
|
|
|
|
|
|
|
furnished to do so, subject to the following conditions: |
|
445
|
|
|
|
|
|
|
|
|
446
|
|
|
|
|
|
|
The above copyright notice and this permission notice shall be included in all |
|
447
|
|
|
|
|
|
|
copies or substantial portions of the Software. |
|
448
|
|
|
|
|
|
|
|
|
449
|
|
|
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
|
450
|
|
|
|
|
|
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
|
451
|
|
|
|
|
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE |
|
452
|
|
|
|
|
|
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
|
453
|
|
|
|
|
|
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, |
|
454
|
|
|
|
|
|
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE |
|
455
|
|
|
|
|
|
|
SOFTWARE. |
|
456
|
|
|
|
|
|
|
|
|
457
|
|
|
|
|
|
|
=back |
|
458
|
|
|
|
|
|
|
|
|
459
|
|
|
|
|
|
|
=head1 SEE ALSO |
|
460
|
|
|
|
|
|
|
|
|
461
|
|
|
|
|
|
|
L<http://tools.ietf.org/html/draft-smith-opentoken-02> |
|
462
|
|
|
|
|
|
|
L<http://www.pingidentity.com/opentoken> |
|
463
|
|
|
|
|
|
|
|
|
464
|
|
|
|
|
|
|
=cut |