Project

General

Profile

1
<?php
2
/**
3
 * @category     Core
4
 * @package      Core_security
5
 * @author       Werner v.d.Decken
6
 * @copyright    ISTeasy-project(http://isteasy.de/)
7
 * @license      Creative Commons BY-SA 3.0 http://creativecommons.org/licenses/by-sa/3.0/
8
 * @version      $Id: PasswordHash.php 2 2017-07-02 15:14:29Z Manuela $
9
 * @filesource   $HeadURL: svn://isteam.dynxs.de/wb/2.10.x/trunk/framework/PasswordHash.php $
10
 * @since        Datei vorhanden seit Release 2.8.2
11
 * @lastmodified $Date: 2017-07-02 17:14:29 +0200 (Sun, 02 Jul 2017) $
12
 *
13
 * this class works with salted md5-hashes with several rounds. 
14
 * For backward compatibility it can compare normal md5-hashes also.
15
 * Minimum requirements: PHP 5.2.2 or higher
16
 *
17
 * *****************************************************************************
18
 * This class is based on the Portable PHP password hashing framework.
19
 * Version 0.3 / genuine. Written by Solar Designer <solar at openwall.com>
20
 * in 2004-2006 and placed in the public domain. Revised in subsequent years,
21
 * still public domain. There's absolutely no warranty.
22
 * The homepage URL for this framework is: http://www.openwall.com/phpass/
23
 * *****************************************************************************
24
 */
25
class PasswordHash {
26

    
27
    const SECURITY_WEAK      = 6;
28
    const SECURITY_MEDIUM    = 8;
29
    const SECURITY_NORMAL    = 10;
30
    const SECURITY_STRONG    = 12;
31
    const SECURITY_STRONGER  = 16;
32

    
33
    private $_itoa64 = './0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz';
34
    private $_iterationCountLog2 = 8;
35
    private $_portableHashes = true;
36
    private $_randomState = '';
37
    
38
    /**
39
     * @param int $iterationCountLog2 number of iterations as exponent of 2
40
     * @param bool $portableHashes TRUE = use MD5 only | FALSE = automatic
41
     */
42
    public function __construct($iterationCountLog2, $portableHashes = true)
43
    {
44

    
45
        if ($iterationCountLog2 < 4 || $iterationCountLog2 > 31) {
46
            $iterationCountLog2 = 8;
47
        }
48
        $this->_iterationCountLog2 = $iterationCountLog2;
49
        $this->_portableHashes = $portableHashes;
50
        $this->_randomState = microtime();
51
        if (function_exists('getmypid')) {
52
            $this->_randomState .= getmypid();
53
        }
54
    }
55

    
56

    
57
    private function _getRandomBytes($count)
58
    {
59
        $output = '';
60
        if (is_readable('/dev/urandom') && ($fh = @fopen('/dev/urandom', 'rb'))) {
61
            $output = fread($fh, $count);
62
            fclose($fh);
63
        }
64
        if (strlen($output) < $count) {
65
            $output = '';
66
            for ($i = 0; $i < $count; $i += 16) {
67
                $this->_randomState = md5(microtime() . $this->_randomState);
68
                $output .= pack('H*', md5($this->_randomState));
69
            }
70
            $output = substr($output, 0, $count);
71
        }
72
        return $output;
73
    }
74

    
75
    private function _Encode64($input, $count)
76
    {
77
        $output = '';
78
        $i = 0;
79
        do {
80
            $value = ord($input[$i++]);
81
            $output .= $this->_itoa64[$value & 0x3f];
82
            if ($i < $count) {
83
                $value |= ord($input[$i]) << 8;
84
            }
85
            $output .= $this->_itoa64[($value >> 6) & 0x3f];
86
            if ($i++ >= $count) { break; }
87
            if ($i < $count) {
88
                $value |= ord($input[$i]) << 16;
89
            }
90
            $output .= $this->_itoa64[($value >> 12) & 0x3f];
91
            if ($i++ >= $count) { break; }
92
            $output .= $this->_itoa64[($value >> 18) & 0x3f];
93
        } while ($i < $count);
94
        return $output;
95
    }
96

    
97
    private function _GenSaltPrivate($input)
98
    {
99
        $output = '$P$';
100
        $output .= $this->_itoa64[min($this->_iterationCountLog2 + 5, 30)];
101
        $output .= $this->_Encode64($input, 6);
102
        return $output;
103
    }
104

    
105
    private function _CryptPrivate($password, $setting)
106
    {
107
        $output = '*0';
108
        if (substr($setting, 0, 2) == $output) {
109
            $output = '*1';
110
        }
111
        $id = substr($setting, 0, 3);
112
        # We use "$P$", phpBB3 uses "$H$" for the same thing
113
        if ($id != '$P$' && $id != '$H$') {
114
            return $output;
115
        }
116
        $count_log2 = strpos($this->_itoa64, $setting[3]);
117
        if ($count_log2 < 7 || $count_log2 > 30) {
118
            return $output;
119
        }
120
        $count = 1 << $count_log2;
121
        $salt = substr($setting, 4, 8);
122
        if (strlen($salt) != 8) {
123
            return $output;
124
        }
125
        # We're kind of forced to use MD5 here since it's the only
126
        # cryptographic primitive available in all versions of PHP
127
        # currently in use.  To implement our own low-level crypto
128
        # in PHP would result in much worse performance and
129
        # consequently in lower iteration counts and hashes that are
130
        # quicker to crack (by non-PHP code).
131
        $hash = md5($salt . $password, TRUE);
132
        do {
133
            $hash = md5($hash . $password, TRUE);
134
        } while (--$count);
135
        $output = substr($setting, 0, 12);
136
        $output .= $this->_Encode64($hash, 16);
137
        return $output;
138
    }
139

    
140
    /**
141
     * calculate the hash from a given password
142
     * @param string $password password as original string
143
     * @return string generated hash | '*' on error
144
     */
145
    public function HashPassword($password, $md5 = false)
146
    {
147
        if ($md5) { return(md5($password)); }
148
        $random = '';
149
        if (strlen($random) < 6) {
150
            $random = $this->_getRandomBytes(6);
151
        }
152
        $hash = $this->_CryptPrivate($password, $this->_GenSaltPrivate($random));
153
        if (strlen($hash) == 34) {
154
            return $hash;
155
        }
156
        # Returning '*' on error is safe here, but would _not_ be safe
157
        # in a crypt(3)-like function used _both_ for generating new
158
        # hashes and for validating passwords against existing hashes.
159
        return '*';
160
    }
161

    
162
    /**
163
     * encodes the password and compare it against the given hash
164
     * @param string $password clear password
165
     * @param string $stored_hash the hash to compare against
166
     * @return bool
167
     */
168
    public function CheckPassword($password, $stored_hash)
169
    {
170
    // compare against a normal, simple md5-hash
171
        if(preg_match('/^[0-9a-f]{32}$/i', $stored_hash)) {
172
            return md5($password) == $stored_hash;
173
        }
174
    // compare against a rounded, salted md5-hash
175
        $hash = $this->_CryptPrivate($password, $stored_hash);
176
        if ($hash[0] == '*') {
177
            $hash = crypt($password, $stored_hash);
178
        }
179
        return $hash == $stored_hash;
180
    }
181
    /**
182
     * generate a case sensitive mnemonic password including numbers and special chars
183
     * makes no use of lowercase 'l', uppercase 'I', 'O' or number '0'
184
     * @param int $length length of the generated password. default = 8
185
     * @return string
186
     */
187
    public static function NewPassword($length = self::SECURITY_MEDIUM)
188
    {
189
        $chars = array(
190
            array('b','c','d','f','g','h','j','k','l','m','n','p','r','s','t','v','w','x','y','z'),
191
            array('a','e','i','o','u'),
192
            array('!','-','@','_',':','.','+','%','/','*')
193
        );
194
        if($length < self::SECURITY_WEAK) { $length = self::SECURITY_WEAK; }
195
        $length = ceil($length / 2);
196
        $Password = array();
197
    // at first fill array alternating with vowels and consonants
198
        for($x = 0; $x < $length; $x++) {
199
            $char = $chars[0][rand(1000, 10000) % sizeof($chars[0])];
200
            $Password[] = $char == 'l' ? 'L' : $char;
201
            $Password[] = $chars[1][rand(1000, 10000) % sizeof($chars[1])];
202
        }
203
    // transform some random chars into uppercase
204
        $pos = ((rand(1000, 10000) % 3) + 1);
205
        while($pos < sizeof($Password)) {
206
            $Password[$pos] = ($Password[$pos] == 'i' || $Password[$pos] == 'o')
207
                              ? $Password[$pos] : strtoupper($Password[$pos]);
208
            $pos += ((rand(1000, 10000) % 3) + 1);
209
        }
210
    // insert some numeric chars, between 1 and 9
211
        $specialChars = array();
212
        $specialCharsCount = floor(sizeof($Password) / 4);
213
        while(sizeof($specialChars) < $specialCharsCount) {
214
            $key = (rand(1000, 10000) % sizeof($Password));
215
            if(!isset($specialChars[$key])) {
216
                $specialChars[$key] = (rand(1000, 10000) % 9) + 1;
217
            }
218
        }
219
    // insert some punctuation chars, but not leading or trailing
220
        $specialCharsCount += floor((sizeof($Password)-1) / 6);
221
        while(sizeof($specialChars) < $specialCharsCount) {
222
            $key = (rand(1000, 10000) % (sizeof($Password)-2))+1;
223
            if(!isset($specialChars[$key])) {
224
                $specialChars[$key] = $chars[2][(rand(1000, 10000) % sizeof($chars[2]))];
225
            }
226
        }
227
        foreach($specialChars as $key=>$val) {
228
            $Password[$key] = $val;
229
        }
230

    
231
        return implode($Password);
232
    }
233

    
234
} // end of class
(5-5/27)