_authenticatorData = new AuthenticatorData($enc['authData']->getBinaryString()); // Format ok? if (!in_array($enc['fmt'], $allowedFormats)) { throw new WebAuthnException('invalid atttestation format: ' . $enc['fmt'], WebAuthnException::INVALID_DATA); } switch ($enc['fmt']) { case 'android-key': $this->_attestationFormat = new Format\AndroidKey($enc, $this->_authenticatorData); break; case 'android-safetynet': $this->_attestationFormat = new Format\AndroidSafetyNet($enc, $this->_authenticatorData); break; case 'apple': $this->_attestationFormat = new Format\Apple($enc, $this->_authenticatorData); break; case 'fido-u2f': $this->_attestationFormat = new Format\U2f($enc, $this->_authenticatorData); break; case 'none': $this->_attestationFormat = new Format\None($enc, $this->_authenticatorData); break; case 'packed': $this->_attestationFormat = new Format\Packed($enc, $this->_authenticatorData); break; case 'tpm': $this->_attestationFormat = new Format\Tpm($enc, $this->_authenticatorData); break; default: throw new WebAuthnException('invalid attestation format: ' . $enc['fmt'], WebAuthnException::INVALID_DATA); } } /** * returns the attestation public key in PEM format * @return AuthenticatorData */ public function getAuthenticatorData() { return $this->_authenticatorData; } /** * returns the certificate chain as PEM * @return string|null */ public function getCertificateChain() { return $this->_attestationFormat->getCertificateChain(); } /** * return the certificate issuer as string * @return string */ public function getCertificateIssuer() { $pem = $this->getCertificatePem(); $issuer = ''; if ($pem) { $certInfo = \openssl_x509_parse($pem); if (\is_array($certInfo) && \is_array($certInfo['issuer'])) { if ($certInfo['issuer']['CN']) { $issuer .= \trim($certInfo['issuer']['CN']); } if ($certInfo['issuer']['O'] || $certInfo['issuer']['OU']) { if ($issuer) { $issuer .= ' (' . \trim($certInfo['issuer']['O'] . ' ' . $certInfo['issuer']['OU']) . ')'; } else { $issuer .= \trim($certInfo['issuer']['O'] . ' ' . $certInfo['issuer']['OU']); } } } } return $issuer; } /** * return the certificate subject as string * @return string */ public function getCertificateSubject() { $pem = $this->getCertificatePem(); $subject = ''; if ($pem) { $certInfo = \openssl_x509_parse($pem); if (\is_array($certInfo) && \is_array($certInfo['subject'])) { if ($certInfo['subject']['CN']) { $subject .= \trim($certInfo['subject']['CN']); } if ($certInfo['subject']['O'] || $certInfo['subject']['OU']) { if ($subject) { $subject .= ' (' . \trim($certInfo['subject']['O'] . ' ' . $certInfo['subject']['OU']) . ')'; } else { $subject .= \trim($certInfo['subject']['O'] . ' ' . $certInfo['subject']['OU']); } } } } return $subject; } /** * returns the key certificate in PEM format * @return string */ public function getCertificatePem() { return $this->_attestationFormat->getCertificatePem(); } /** * checks validity of the signature * @param string $clientDataHash * @return bool * @throws WebAuthnException */ public function validateAttestation($clientDataHash) { return $this->_attestationFormat->validateAttestation($clientDataHash); } /** * validates the certificate against root certificates * @param array $rootCas * @return boolean * @throws WebAuthnException */ public function validateRootCertificate($rootCas) { return $this->_attestationFormat->validateRootCertificate($rootCas); } /** * checks if the RpId-Hash is valid * @param string$rpIdHash * @return bool */ public function validateRpIdHash($rpIdHash) { return $rpIdHash === $this->_authenticatorData->getRpIdHash(); } }