You've already forked joomla_test
first commit
This commit is contained in:
252
libraries/joomla/crypt/crypt.php
Normal file
252
libraries/joomla/crypt/crypt.php
Normal file
@ -0,0 +1,252 @@
|
||||
<?php
|
||||
/**
|
||||
* @package Joomla.Platform
|
||||
* @subpackage Crypt
|
||||
*
|
||||
* @copyright Copyright (C) 2005 - 2011 Open Source Matters, Inc. All rights reserved.
|
||||
* @license GNU General Public License version 2 or later; see LICENSE
|
||||
*/
|
||||
|
||||
defined('JPATH_PLATFORM') or die;
|
||||
|
||||
/**
|
||||
* JCrypt is a Joomla Platform class for handling basic encryption/decryption of data.
|
||||
*
|
||||
* @package Joomla.Platform
|
||||
* @subpackage Crypt
|
||||
* @since 12.1
|
||||
*/
|
||||
class JCrypt
|
||||
{
|
||||
/**
|
||||
* @var JCryptCipher The encryption cipher object.
|
||||
* @since 12.1
|
||||
*/
|
||||
private $_cipher;
|
||||
|
||||
/**
|
||||
* @var JCryptKey The encryption key[/pair)].
|
||||
* @since 12.1
|
||||
*/
|
||||
private $_key;
|
||||
|
||||
/**
|
||||
* Object Constructor takes an optional key to be used for encryption/decryption. If no key is given then the
|
||||
* secret word from the configuration object is used.
|
||||
*
|
||||
* @param JCryptCipher $cipher The encryption cipher object.
|
||||
* @param JCryptKey $key The encryption key[/pair)].
|
||||
*
|
||||
* @since 12.1
|
||||
*/
|
||||
public function __construct(JCryptCipher $cipher = null, JCryptKey $key = null)
|
||||
{
|
||||
// Set the encryption key[/pair)].
|
||||
$this->_key = $key;
|
||||
|
||||
// Set the encryption cipher.
|
||||
$this->_cipher = isset($cipher) ? $cipher : new JCryptCipherSimple;
|
||||
}
|
||||
|
||||
/**
|
||||
* Method to decrypt a data string.
|
||||
*
|
||||
* @param string $data The encrypted string to decrypt.
|
||||
*
|
||||
* @return string The decrypted data string.
|
||||
*
|
||||
* @since 12.1
|
||||
*/
|
||||
public function decrypt($data)
|
||||
{
|
||||
return $this->_cipher->decrypt($data, $this->_key);
|
||||
}
|
||||
|
||||
/**
|
||||
* Method to encrypt a data string.
|
||||
*
|
||||
* @param string $data The data string to encrypt.
|
||||
*
|
||||
* @return string The encrypted data string.
|
||||
*
|
||||
* @since 12.1
|
||||
*/
|
||||
public function encrypt($data)
|
||||
{
|
||||
return $this->_cipher->encrypt($data, $this->_key);
|
||||
}
|
||||
|
||||
/**
|
||||
* Method to generate a new encryption key[/pair] object.
|
||||
*
|
||||
* @param array $options Key generation options.
|
||||
*
|
||||
* @return JCryptKey
|
||||
*
|
||||
* @since 12.1
|
||||
*/
|
||||
public function generateKey(array $options = array())
|
||||
{
|
||||
return $this->_cipher->generateKey($options);
|
||||
}
|
||||
|
||||
/**
|
||||
* Method to set the encryption key[/pair] object.
|
||||
*
|
||||
* @param JCryptKey $key The key object to set.
|
||||
*
|
||||
* @return JCrypt
|
||||
*
|
||||
* @since 12.1
|
||||
*/
|
||||
public function setKey(JCryptKey $key)
|
||||
{
|
||||
$this->_key = $key;
|
||||
|
||||
return $this;
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate random bytes.
|
||||
*
|
||||
* @param integer $length Length of the random data to generate
|
||||
*
|
||||
* @return string Random binary data
|
||||
*
|
||||
* @since 12.1
|
||||
*/
|
||||
public static function genRandomBytes($length = 16)
|
||||
{
|
||||
$sslStr = '';
|
||||
|
||||
/*
|
||||
* if a secure randomness generator exists and we don't
|
||||
* have a buggy PHP version use it.
|
||||
*/
|
||||
if (function_exists('openssl_random_pseudo_bytes')
|
||||
&& (version_compare(PHP_VERSION, '5.3.4') >= 0 || IS_WIN))
|
||||
{
|
||||
$sslStr = openssl_random_pseudo_bytes($length, $strong);
|
||||
|
||||
if ($strong)
|
||||
{
|
||||
return $sslStr;
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
* Collect any entropy available in the system along with a number
|
||||
* of time measurements of operating system randomness.
|
||||
*/
|
||||
$bitsPerRound = 2;
|
||||
$maxTimeMicro = 400;
|
||||
$shaHashLength = 20;
|
||||
$randomStr = '';
|
||||
$total = $length;
|
||||
|
||||
// Check if we can use /dev/urandom.
|
||||
$urandom = false;
|
||||
$handle = null;
|
||||
|
||||
// This is PHP 5.3.3 and up
|
||||
if (function_exists('stream_set_read_buffer') && @is_readable('/dev/urandom'))
|
||||
{
|
||||
$handle = @fopen('/dev/urandom', 'rb');
|
||||
|
||||
if ($handle)
|
||||
{
|
||||
$urandom = true;
|
||||
}
|
||||
}
|
||||
|
||||
while ($length > strlen($randomStr))
|
||||
{
|
||||
$bytes = ($total > $shaHashLength)? $shaHashLength : $total;
|
||||
$total -= $bytes;
|
||||
|
||||
/*
|
||||
* Collect any entropy available from the PHP system and filesystem.
|
||||
* If we have ssl data that isn't strong, we use it once.
|
||||
*/
|
||||
$entropy = rand() . uniqid(mt_rand(), true) . $sslStr;
|
||||
$entropy .= implode('', @fstat(fopen(__FILE__, 'r')));
|
||||
$entropy .= memory_get_usage();
|
||||
$sslStr = '';
|
||||
|
||||
if ($urandom)
|
||||
{
|
||||
stream_set_read_buffer($handle, 0);
|
||||
$entropy .= @fread($handle, $bytes);
|
||||
}
|
||||
else
|
||||
{
|
||||
/*
|
||||
* There is no external source of entropy so we repeat calls
|
||||
* to mt_rand until we are assured there's real randomness in
|
||||
* the result.
|
||||
*
|
||||
* Measure the time that the operations will take on average.
|
||||
*/
|
||||
$samples = 3;
|
||||
$duration = 0;
|
||||
|
||||
for ($pass = 0; $pass < $samples; ++$pass)
|
||||
{
|
||||
$microStart = microtime(true) * 1000000;
|
||||
$hash = sha1(mt_rand(), true);
|
||||
|
||||
for ($count = 0; $count < 50; ++$count)
|
||||
{
|
||||
$hash = sha1($hash, true);
|
||||
}
|
||||
|
||||
$microEnd = microtime(true) * 1000000;
|
||||
$entropy .= $microStart . $microEnd;
|
||||
|
||||
if ($microStart >= $microEnd)
|
||||
{
|
||||
$microEnd += 1000000;
|
||||
}
|
||||
|
||||
$duration += $microEnd - $microStart;
|
||||
}
|
||||
|
||||
$duration = $duration / $samples;
|
||||
|
||||
/*
|
||||
* Based on the average time, determine the total rounds so that
|
||||
* the total running time is bounded to a reasonable number.
|
||||
*/
|
||||
$rounds = (int) (($maxTimeMicro / $duration) * 50);
|
||||
|
||||
/*
|
||||
* Take additional measurements. On average we can expect
|
||||
* at least $bitsPerRound bits of entropy from each measurement.
|
||||
*/
|
||||
$iter = $bytes * (int) ceil(8 / $bitsPerRound);
|
||||
|
||||
for ($pass = 0; $pass < $iter; ++$pass)
|
||||
{
|
||||
$microStart = microtime(true);
|
||||
$hash = sha1(mt_rand(), true);
|
||||
|
||||
for ($count = 0; $count < $rounds; ++$count)
|
||||
{
|
||||
$hash = sha1($hash, true);
|
||||
}
|
||||
|
||||
$entropy .= $microStart . microtime(true);
|
||||
}
|
||||
}
|
||||
|
||||
$randomStr .= sha1($entropy, true);
|
||||
}
|
||||
|
||||
if ($urandom)
|
||||
{
|
||||
@fclose($handle);
|
||||
}
|
||||
|
||||
return substr($randomStr, 0, $length);
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user