| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527 | 
							- <?php
 
- /**
 
-  * 验证支付宝公钥证书是否可信
 
-  * @param $alipayCert 支付宝公钥证书
 
-  * @param $rootCert 支付宝根证书
 
-  */
 
- function isTrusted($alipayCert, $rootCert)
 
- {
 
-     $alipayCerts = readPemCertChain($alipayCert);
 
-     $rootCerts = readPemCertChain($rootCert);
 
-     if (verifyCertChain($alipayCerts, $rootCerts)) {
 
-         return verifySignature($alipayCert, $rootCert);
 
-     } else {
 
-         return false;
 
-     }
 
- }
 
- function verifySignature($alipayCert, $rootCert)
 
- {
 
-     $alipayCertArray = explode("-----END CERTIFICATE-----", $alipayCert);
 
-     $rootCertArray = explode("-----END CERTIFICATE-----", $rootCert);
 
-     $length = count($rootCertArray) - 1;
 
-     $checkSign = isCertSigner($alipayCertArray[0] . "-----END CERTIFICATE-----", $alipayCertArray[1] . "-----END CERTIFICATE-----");
 
-     if (!$checkSign) {
 
-         $checkSign = isCertSigner($alipayCertArray[1] . "-----END CERTIFICATE-----", $alipayCertArray[0] . "-----END CERTIFICATE-----");
 
-         if ($checkSign) {
 
-             $issuer = openssl_x509_parse($alipayCertArray[0] . "-----END CERTIFICATE-----")['issuer'];
 
-             for ($i = 0; $i < $length; $i++) {
 
-                 $subject = openssl_x509_parse($rootCertArray[$i] . "-----END CERTIFICATE-----")['subject'];
 
-                 if ($issuer == $subject) {
 
-                     isCertSigner($alipayCertArray[0] . "-----END CERTIFICATE-----", $rootCertArray[$i] . $rootCertArray);
 
-                     return $checkSign;
 
-                 }
 
-             }
 
-         } else {
 
-             return $checkSign;
 
-         }
 
-     } else {
 
-         $issuer = openssl_x509_parse($alipayCertArray[1] . "-----END CERTIFICATE-----")['issuer'];
 
-         for ($i = 0; $i < $length; $i++) {
 
-             $subject = openssl_x509_parse($rootCertArray[$i] . "-----END CERTIFICATE-----")['subject'];
 
-             if ($issuer == $subject) {
 
-                 $checkSign = isCertSigner($alipayCertArray[1] . "-----END CERTIFICATE-----", $rootCertArray[$i] . "-----END CERTIFICATE-----");
 
-                 return $checkSign;
 
-             }
 
-         }
 
-         return $checkSign;
 
-     }
 
- }
 
- function readPemCertChain($cert)
 
- {
 
-     $array = explode("-----END CERTIFICATE-----", $cert);
 
-     $certs[] = null;
 
-     for ($i = 0; $i < count($array) - 1; $i++) {
 
-         $certs[$i] = openssl_x509_parse($array[$i] . "-----END CERTIFICATE-----");
 
-     }
 
-     return $certs;
 
- }
 
- function verifyCert($prev, $rootCerts)
 
- {
 
-     $nowTime = time();
 
-     if ($nowTime < $prev['validFrom_time_t']) {
 
-         echo "证书未激活";
 
-         return false;
 
-     }
 
-     if ($nowTime > $prev['validTo_time_t']) {
 
-         echo "证书已经过期";
 
-         return false;
 
-     }
 
-     $subjectMap = null;
 
-     for ($i = 0; $i < count($rootCerts); $i++) {
 
-         $subjectDN = array2string($rootCerts[$i]['subject']);
 
-         $subjectMap[$subjectDN] = $rootCerts[$i];
 
-     }
 
-     $issuerDN = array2string(($prev['issuer']));
 
-     if (!array_key_exists($issuerDN, $subjectMap)) {
 
-         echo "证书链验证失败";
 
-         return false;
 
-     }
 
-     return true;
 
- }
 
- /**
 
-  * 验证证书链是否是信任证书库中证书签发的
 
-  * @param $alipayCerts 目标验证证书列表
 
-  * @param $rootCerts 可信根证书列表
 
-  */
 
- function verifyCertChain($alipayCerts, $rootCerts)
 
- {
 
-     $sorted = sortByDn($alipayCerts);
 
-     if (!$sorted) {
 
-         echo "证书链验证失败:不是完整的证书链";
 
-         return false;
 
-     }
 
-     //先验证第一个证书是不是信任库中证书签发的
 
-     $prev = $alipayCerts[0];
 
-     $firstOK = verifyCert($prev, $rootCerts);
 
-     $length = count($alipayCerts);
 
-     if (!$firstOK || $length == 1) {
 
-         return $firstOK;
 
-     }
 
-     $nowTime = time();
 
-     //验证证书链
 
-     for ($i = 1; $i < $length; $i++) {
 
-         $cert = $alipayCerts[$i];
 
-         if ($nowTime < $cert['validFrom_time_t']) {
 
-             echo "证书未激活";
 
-             return false;
 
-         }
 
-         if ($nowTime > $cert['validTo_time_t']) {
 
-             echo "证书已经过期";
 
-             return false;
 
-         }
 
-     }
 
-     return true;
 
- }
 
- /**
 
-  * 将证书链按照完整的签发顺序进行排序,排序后证书链为:[issuerA, subjectA]-[issuerA, subjectB]-[issuerB, subjectC]-[issuerC, subjectD]...
 
-  * @param $certs 证书链
 
-  */
 
- function sortByDn(&$certs)
 
- {
 
-     //是否包含自签名证书
 
-     $hasSelfSignedCert = false;
 
-     $subjectMap = null;
 
-     $issuerMap = null;
 
-     for ($i = 0; $i < count($certs); $i++) {
 
-         if (isSelfSigned($certs[$i])) {
 
-             if ($hasSelfSignedCert) {
 
-                 return false;
 
-             }
 
-             $hasSelfSignedCert = true;
 
-         }
 
-         $subjectDN = array2string($certs[$i]['subject']);
 
-         $issuerDN = array2string(($certs[$i]['issuer']));
 
-         $subjectMap[$subjectDN] = $certs[$i];
 
-         $issuerMap[$issuerDN] = $certs[$i];
 
-     }
 
-     $certChain = null;
 
-     addressingUp($subjectMap, $certChain, $certs[0]);
 
-     addressingDown($issuerMap, $certChain, $certs[0]);
 
-     //说明证书链不完整
 
-     if (count($certs) != count($certChain)) {
 
-         return false;
 
-     }
 
-     //将证书链复制到原先的数据
 
-     for ($i = 0; $i < count($certs); $i++) {
 
-         $certs[$i] = $certChain[count($certs) - $i - 1];
 
-     }
 
-     return true;
 
- }
 
- /**
 
-  * 验证证书是否是自签发的
 
-  * @param $cert 目标证书
 
-  */
 
- function isSelfSigned($cert)
 
- {
 
-     $subjectDN = array2string($cert['subject']);
 
-     $issuerDN = array2string($cert['issuer']);
 
-     return ($subjectDN == $issuerDN);
 
- }
 
- function array2string($array)
 
- {
 
-     $string = [];
 
-     if ($array && is_array($array)) {
 
-         foreach ($array as $key => $value) {
 
-             $string[] = $key . '=' . $value;
 
-         }
 
-     }
 
-     return implode(',', $string);
 
- }
 
- /**
 
-  * 向上构造证书链
 
-  * @param $subjectMap 主题和证书的映射
 
-  * @param $certChain 证书链
 
-  * @param $current 当前需要插入证书链的证书,include
 
-  */
 
- function addressingUp($subjectMap, &$certChain, $current)
 
- {
 
-     $certChain[] = $current;
 
-     if (isSelfSigned($current)) {
 
-         return;
 
-     }
 
-     $issuerDN = array2string($current['issuer']);
 
-     if (!array_key_exists($issuerDN, $subjectMap)) {
 
-         return;
 
-     }
 
-     addressingUp($subjectMap, $certChain, $subjectMap[$issuerDN]);
 
- }
 
- /**
 
-  * 向下构造证书链
 
-  * @param $issuerMap 签发者和证书的映射
 
-  * @param $certChain 证书链
 
-  * @param $current 当前需要插入证书链的证书,exclude
 
-  */
 
- function addressingDown($issuerMap, &$certChain, $current)
 
- {
 
-     $subjectDN = array2string($current['subject']);
 
-     if (!array_key_exists($subjectDN, $issuerMap)) {
 
-         return $certChain;
 
-     }
 
-     $certChain[] = $issuerMap[$subjectDN];
 
-     addressingDown($issuerMap, $certChain, $issuerMap[$subjectDN]);
 
- }
 
- /**
 
-  * Extract signature from der encoded cert.
 
-  * Expects x509 der encoded certificate consisting of a section container
 
-  * containing 2 sections and a bitstream.  The bitstream contains the
 
-  * original encrypted signature, encrypted by the public key of the issuing
 
-  * signer.
 
-  * @param string $der
 
-  * @return string on success
 
-  * @return bool false on failures
 
-  */
 
- function extractSignature($der = false)
 
- {
 
-     if (strlen($der) < 5) {
 
-         return false;
 
-     }
 
-     // skip container sequence
 
-     $der = substr($der, 4);
 
-     // now burn through two sequences and the return the final bitstream
 
-     while (strlen($der) > 1) {
 
-         $class = ord($der[0]);
 
-         $classHex = dechex($class);
 
-         switch ($class) {
 
-             // BITSTREAM
 
-             case 0x03:
 
-                 $len = ord($der[1]);
 
-                 $bytes = 0;
 
-                 if ($len & 0x80) {
 
-                     $bytes = $len & 0x0f;
 
-                     $len = 0;
 
-                     for ($i = 0; $i < $bytes; $i++) {
 
-                         $len = ($len << 8) | ord($der[$i + 2]);
 
-                     }
 
-                 }
 
-                 return substr($der, 3 + $bytes, $len);
 
-                 break;
 
-             // SEQUENCE
 
-             case 0x30:
 
-                 $len = ord($der[1]);
 
-                 $bytes = 0;
 
-                 if ($len & 0x80) {
 
-                     $bytes = $len & 0x0f;
 
-                     $len = 0;
 
-                     for ($i = 0; $i < $bytes; $i++) {
 
-                         $len = ($len << 8) | ord($der[$i + 2]);
 
-                     }
 
-                 }
 
-                 $contents = substr($der, 2 + $bytes, $len);
 
-                 $der = substr($der, 2 + $bytes + $len);
 
-                 break;
 
-             default:
 
-                 return false;
 
-                 break;
 
-         }
 
-     }
 
-     return false;
 
- }
 
- /**
 
-  * Get signature algorithm oid from der encoded signature data.
 
-  * Expects decrypted signature data from a certificate in der format.
 
-  * This ASN1 data should contain the following structure:
 
-  * SEQUENCE
 
-  *    SEQUENCE
 
-  *       OID    (signature algorithm)
 
-  *       NULL
 
-  * OCTET STRING (signature hash)
 
-  * @return bool false on failures
 
-  * @return string oid
 
-  */
 
- function getSignatureAlgorithmOid($der = null)
 
- {
 
-     // Validate this is the der we need...
 
-     if (!is_string($der) or strlen($der) < 5) {
 
-         return false;
 
-     }
 
-     $bit_seq1 = 0;
 
-     $bit_seq2 = 2;
 
-     $bit_oid = 4;
 
-     if (ord($der[$bit_seq1]) !== 0x30) {
 
-         die('Invalid DER passed to getSignatureAlgorithmOid()');
 
-     }
 
-     if (ord($der[$bit_seq2]) !== 0x30) {
 
-         die('Invalid DER passed to getSignatureAlgorithmOid()');
 
-     }
 
-     if (ord($der[$bit_oid]) !== 0x06) {
 
-         die('Invalid DER passed to getSignatureAlgorithmOid');
 
-     }
 
-     // strip out what we don't need and get the oid
 
-     $der = substr($der, $bit_oid);
 
-     // Get the oid
 
-     $len = ord($der[1]);
 
-     $bytes = 0;
 
-     if ($len & 0x80) {
 
-         $bytes = $len & 0x0f;
 
-         $len = 0;
 
-         for ($i = 0; $i < $bytes; $i++) {
 
-             $len = ($len << 8) | ord($der[$i + 2]);
 
-         }
 
-     }
 
-     $oid_data = substr($der, 2 + $bytes, $len);
 
-     // Unpack the OID
 
-     $oid = floor(ord($oid_data[0]) / 40);
 
-     $oid .= '.' . ord($oid_data[0]) % 40;
 
-     $value = 0;
 
-     $i = 1;
 
-     while ($i < strlen($oid_data)) {
 
-         $value = $value << 7;
 
-         $value = $value | (ord($oid_data[$i]) & 0x7f);
 
-         if (!(ord($oid_data[$i]) & 0x80)) {
 
-             $oid .= '.' . $value;
 
-             $value = 0;
 
-         }
 
-         $i++;
 
-     }
 
-     return $oid;
 
- }
 
- /**
 
-  * Get signature hash from der encoded signature data.
 
-  * Expects decrypted signature data from a certificate in der format.
 
-  * This ASN1 data should contain the following structure:
 
-  * SEQUENCE
 
-  *    SEQUENCE
 
-  *       OID    (signature algorithm)
 
-  *       NULL
 
-  * OCTET STRING (signature hash)
 
-  * @return bool false on failures
 
-  * @return string hash
 
-  */
 
- function getSignatureHash($der = null)
 
- {
 
-     // Validate this is the der we need...
 
-     if (!is_string($der) or strlen($der) < 5) {
 
-         return false;
 
-     }
 
-     if (ord($der[0]) !== 0x30) {
 
-         die('Invalid DER passed to getSignatureHash()');
 
-     }
 
-     // strip out the container sequence
 
-     $der = substr($der, 2);
 
-     if (ord($der[0]) !== 0x30) {
 
-         die('Invalid DER passed to getSignatureHash()');
 
-     }
 
-     // Get the length of the first sequence so we can strip it out.
 
-     $len = ord($der[1]);
 
-     $bytes = 0;
 
-     if ($len & 0x80) {
 
-         $bytes = $len & 0x0f;
 
-         $len = 0;
 
-         for ($i = 0; $i < $bytes; $i++) {
 
-             $len = ($len << 8) | ord($der[$i + 2]);
 
-         }
 
-     }
 
-     $der = substr($der, 2 + $bytes + $len);
 
-     // Now we should have an octet string
 
-     if (ord($der[0]) !== 0x04) {
 
-         die('Invalid DER passed to getSignatureHash()');
 
-     }
 
-     $len = ord($der[1]);
 
-     $bytes = 0;
 
-     if ($len & 0x80) {
 
-         $bytes = $len & 0x0f;
 
-         $len = 0;
 
-         for ($i = 0; $i < $bytes; $i++) {
 
-             $len = ($len << 8) | ord($der[$i + 2]);
 
-         }
 
-     }
 
-     return bin2hex(substr($der, 2 + $bytes, $len));
 
- }
 
- /**
 
-  * Determine if one cert was used to sign another
 
-  * Note that more than one CA cert can give a positive result, some certs
 
-  * re-issue signing certs after having only changed the expiration dates.
 
-  * @param string $cert - PEM encoded cert
 
-  * @param string $caCert - PEM encoded cert that possibly signed $cert
 
-  * @return bool
 
-  */
 
- function isCertSigner($certPem = null, $caCertPem = null)
 
- {
 
-     if (!function_exists('openssl_pkey_get_public')) {
 
-         die('Need the openssl_pkey_get_public() function.');
 
-     }
 
-     if (!function_exists('openssl_public_decrypt')) {
 
-         die('Need the openssl_public_decrypt() function.');
 
-     }
 
-     if (!function_exists('hash')) {
 
-         die('Need the php hash() function.');
 
-     }
 
-     if (empty($certPem) or empty($caCertPem)) {
 
-         return false;
 
-     }
 
-     // Convert the cert to der for feeding to extractSignature.
 
-     $certDer = pemToDer($certPem);
 
-     if (!is_string($certDer)) {
 
-         die('invalid certPem');
 
-     }
 
-     // Grab the encrypted signature from the der encoded cert.
 
-     $encryptedSig = extractSignature($certDer);
 
-     if (!is_string($encryptedSig)) {
 
-         die('Failed to extract encrypted signature from certPem.');
 
-     }
 
-     // Extract the public key from the ca cert, which is what has
 
-     // been used to encrypt the signature in the cert.
 
-     $pubKey = openssl_pkey_get_public($caCertPem);
 
-     if ($pubKey === false) {
 
-         die('Failed to extract the public key from the ca cert.');
 
-     }
 
-     // Attempt to decrypt the encrypted signature using the CA's public
 
-     // key, returning the decrypted signature in $decryptedSig.  If
 
-     // it can't be decrypted, this ca was not used to sign it for sure...
 
-     $rc = openssl_public_decrypt($encryptedSig, $decryptedSig, $pubKey);
 
-     if ($rc === false) {
 
-         return false;
 
-     }
 
-     // We now have the decrypted signature, which is der encoded
 
-     // asn1 data containing the signature algorithm and signature hash.
 
-     // Now we need what was originally hashed by the issuer, which is
 
-     // the original DER encoded certificate without the issuer and
 
-     // signature information.
 
-     $origCert = stripSignerAsn($certDer);
 
-     if ($origCert === false) {
 
-         die('Failed to extract unsigned cert.');
 
-     }
 
-     // Get the oid of the signature hash algorithm, which is required
 
-     // to generate our own hash of the original cert.  This hash is
 
-     // what will be compared to the issuers hash.
 
-     $oid = getSignatureAlgorithmOid($decryptedSig);
 
-     if ($oid === false) {
 
-         die('Failed to determine the signature algorithm.');
 
-     }
 
-     switch ($oid) {
 
-         case '1.2.840.113549.2.2':
 
-             $algo = 'md2';
 
-             break;
 
-         case '1.2.840.113549.2.4':
 
-             $algo = 'md4';
 
-             break;
 
-         case '1.2.840.113549.2.5':
 
-             $algo = 'md5';
 
-             break;
 
-         case '1.3.14.3.2.18':
 
-             $algo = 'sha';
 
-             break;
 
-         case '1.3.14.3.2.26':
 
-             $algo = 'sha1';
 
-             break;
 
-         case '2.16.840.1.101.3.4.2.1':
 
-             $algo = 'sha256';
 
-             break;
 
-         case '2.16.840.1.101.3.4.2.2':
 
-             $algo = 'sha384';
 
-             break;
 
-         case '2.16.840.1.101.3.4.2.3':
 
-             $algo = 'sha512';
 
-             break;
 
-         default:
 
-             die('Unknown signature hash algorithm oid: ' . $oid);
 
-             break;
 
-     }
 
-     // Get the issuer generated hash from the decrypted signature.
 
-     $decryptedHash = getSignatureHash($decryptedSig);
 
-     // Ok, hash the original unsigned cert with the same algorithm
 
-     // and if it matches $decryptedHash we have a winner.
 
-     $certHash = hash($algo, $origCert);
 
-     return ($decryptedHash === $certHash);
 
- }
 
- /**
 
-  * Convert pem encoded certificate to DER encoding
 
-  * @return string $derEncoded on success
 
-  * @return bool false on failures
 
-  */
 
- function pemToDer($pem = null)
 
- {
 
-     if (!is_string($pem)) {
 
-         return false;
 
-     }
 
-     $cert_split = preg_split('/(-----((BEGIN)|(END)) CERTIFICATE-----)/', $pem);
 
-     if (!isset($cert_split[1])) {
 
-         return false;
 
-     }
 
-     return base64_decode($cert_split[1]);
 
- }
 
- /**
 
-  * Obtain der cert with issuer and signature sections stripped.
 
-  * @param string $der - der encoded certificate
 
-  * @return string $der on success
 
-  * @return bool false on failures.
 
-  */
 
- function stripSignerAsn($der = null)
 
- {
 
-     if (!is_string($der) or strlen($der) < 8) {
 
-         return false;
 
-     }
 
-     $bit = 4;
 
-     $len = ord($der[($bit + 1)]);
 
-     $bytes = 0;
 
-     if ($len & 0x80) {
 
-         $bytes = $len & 0x0f;
 
-         $len = 0;
 
-         for ($i = 0; $i < $bytes; $i++) {
 
-             $len = ($len << 8) | ord($der[$bit + $i + 2]);
 
-         }
 
-     }
 
-     return substr($der, 4, $len + 4);
 
- }
 
 
  |