?
Path : /home/admin/domains/happytokorea.com/public_html_bk/test2/libraries/joomla/crypt/ |
Current File : /home/admin/domains/happytokorea.com/public_html_bk/test2/libraries/joomla/crypt/crypt.php |
<?php /** * @package Joomla.Platform * @subpackage Crypt * * @copyright Copyright (C) 2005 - 2011 Open Source Matters, Inc. All rights reserved. * @license GNU General Public License version 2 or later; see LICENSE */ defined('JPATH_PLATFORM') or die; /** * JCrypt is a Joomla Platform class for handling basic encryption/decryption of data. * * @package Joomla.Platform * @subpackage Crypt * @since 12.1 */ class JCrypt { /** * @var JCryptCipher The encryption cipher object. * @since 12.1 */ private $_cipher; /** * @var JCryptKey The encryption key[/pair)]. * @since 12.1 */ private $_key; /** * Object Constructor takes an optional key to be used for encryption/decryption. If no key is given then the * secret word from the configuration object is used. * * @param JCryptCipher $cipher The encryption cipher object. * @param JCryptKey $key The encryption key[/pair)]. * * @since 12.1 */ public function __construct(JCryptCipher $cipher = null, JCryptKey $key = null) { // Set the encryption key[/pair)]. $this->_key = $key; // Set the encryption cipher. $this->_cipher = isset($cipher) ? $cipher : new JCryptCipherSimple; } /** * Method to decrypt a data string. * * @param string $data The encrypted string to decrypt. * * @return string The decrypted data string. * * @since 12.1 * @throws InvalidArgumentException */ public function decrypt($data) { try { return $this->_cipher->decrypt($data, $this->_key); } catch (InvalidArgumentException $e) { return false; } } /** * Method to encrypt a data string. * * @param string $data The data string to encrypt. * * @return string The encrypted data string. * * @since 12.1 */ public function encrypt($data) { return $this->_cipher->encrypt($data, $this->_key); } /** * Method to generate a new encryption key[/pair] object. * * @param array $options Key generation options. * * @return JCryptKey * * @since 12.1 */ public function generateKey(array $options = array()) { return $this->_cipher->generateKey($options); } /** * Method to set the encryption key[/pair] object. * * @param JCryptKey $key The key object to set. * * @return JCrypt * * @since 12.1 */ public function setKey(JCryptKey $key) { $this->_key = $key; return $this; } /** * Generate random bytes. * * @param integer $length Length of the random data to generate * * @return string Random binary data * * @since 12.1 */ public static function genRandomBytes($length = 16) { $length = (int) $length; $sslStr = ''; /* * If a secure randomness generator exists and we don't * have a buggy PHP version use it. */ if (function_exists('openssl_random_pseudo_bytes') && (version_compare(PHP_VERSION, '5.3.4') >= 0 || IS_WIN)) { $sslStr = openssl_random_pseudo_bytes($length, $strong); if ($strong) { return $sslStr; } } /* * Collect any entropy available in the system along with a number * of time measurements of operating system randomness. */ $bitsPerRound = 2; $maxTimeMicro = 400; $shaHashLength = 20; $randomStr = ''; $total = $length; // Check if we can use /dev/urandom. $urandom = false; $handle = null; // This is PHP 5.3.3 and up if (function_exists('stream_set_read_buffer') && @is_readable('/dev/urandom')) { $handle = @fopen('/dev/urandom', 'rb'); if ($handle) { $urandom = true; } } while ($length > strlen($randomStr)) { $bytes = ($total > $shaHashLength)? $shaHashLength : $total; $total -= $bytes; /* * Collect any entropy available from the PHP system and filesystem. * If we have ssl data that isn't strong, we use it once. */ $entropy = rand() . uniqid(mt_rand(), true) . $sslStr; $entropy .= implode('', @fstat(fopen(__FILE__, 'r'))); $entropy .= memory_get_usage(); $sslStr = ''; if ($urandom) { stream_set_read_buffer($handle, 0); $entropy .= @fread($handle, $bytes); } else { /* * There is no external source of entropy so we repeat calls * to mt_rand until we are assured there's real randomness in * the result. * * Measure the time that the operations will take on average. */ $samples = 3; $duration = 0; for ($pass = 0; $pass < $samples; ++$pass) { $microStart = microtime(true) * 1000000; $hash = sha1(mt_rand(), true); for ($count = 0; $count < 50; ++$count) { $hash = sha1($hash, true); } $microEnd = microtime(true) * 1000000; $entropy .= $microStart . $microEnd; if ($microStart >= $microEnd) { $microEnd += 1000000; } $duration += $microEnd - $microStart; } $duration = $duration / $samples; /* * Based on the average time, determine the total rounds so that * the total running time is bounded to a reasonable number. */ $rounds = (int) (($maxTimeMicro / $duration) * 50); /* * Take additional measurements. On average we can expect * at least $bitsPerRound bits of entropy from each measurement. */ $iter = $bytes * (int) ceil(8 / $bitsPerRound); for ($pass = 0; $pass < $iter; ++$pass) { $microStart = microtime(true); $hash = sha1(mt_rand(), true); for ($count = 0; $count < $rounds; ++$count) { $hash = sha1($hash, true); } $entropy .= $microStart . microtime(true); } } $randomStr .= sha1($entropy, true); } if ($urandom) { @fclose($handle); } return substr($randomStr, 0, $length); } /** * A timing safe comparison method. This defeats hacking * attempts that use timing based attack vectors. * * @param string $known A known string to check against. * @param string $unknown An unknown string to check. * * @return boolean True if the two strings are exactly the same. * * @since 3.2 */ public static function timingSafeCompare($known, $unknown) { // Prevent issues if string length is 0 $known .= chr(0); $unknown .= chr(0); $knownLength = strlen($known); $unknownLength = strlen($unknown); // Set the result to the difference between the lengths $result = $knownLength - $unknownLength; // Note that we ALWAYS iterate over the user-supplied length to prevent leaking length info. for ($i = 0; $i < $unknownLength; $i++) { // Using % here is a trick to prevent notices. It's safe, since if the lengths are different, $result is already non-0 $result |= (ord($known[$i % $knownLength]) ^ ord($unknown[$i])); } // They are only identical strings if $result is exactly 0... return $result === 0; } /** * Tests for the availability of updated crypt(). * Based on a method by Anthony Ferrera * * @return boolean True if updated crypt() is available. * * @note To be removed when PHP 5.3.7 or higher is the minimum supported version. * @see https://github.com/ircmaxell/password_compat/blob/master/version-test.php * @since 3.2 */ public static function hasStrongPasswordSupport() { static $pass = null; if (is_null($pass)) { // Check to see whether crypt() is supported. if (version_compare(PHP_VERSION, '5.3.7', '>=') === true) { // We have safe PHP version. $pass = true; } else { // We need to test if we have patched PHP version. jimport('compat.password.lib.version_test'); $test = new version_test; $pass = $test->version_test(); } if ($pass && !defined('PASSWORD_DEFAULT')) { // Always make sure that the password hashing API has been defined. include_once JPATH_ROOT . '/libraries/compat/password/lib/password.php'; } } return $pass; } }