1 | <?php |
||
22 | class PasswordEncoder |
||
23 | { |
||
24 | const ALGORITHM_MD2 = 'MD2'; |
||
25 | const ALGORITHM_MD4 = 'MD4'; |
||
26 | const ALGORITHM_MD5 = 'MD5'; |
||
27 | const ALGORITHM_SHA_1 = 'SHA-1'; |
||
28 | const ALGORITHM_SHA_256 = 'SHA-256'; |
||
29 | const ALGORITHM_SHA_384 = 'SHA-384'; |
||
30 | const ALGORITHM_SHA_512 = 'SHA-512'; |
||
31 | const ALGORITHM_RIPEMD = 'RIPEMD'; |
||
32 | const ALGORITHM_RIPEMD_160 = 'RIPEMD-160'; |
||
33 | const ALGORITHM_MAC = 'MAC'; |
||
34 | const ALGORITHM_HMAC = 'HMAC'; |
||
35 | |||
36 | /** |
||
37 | * Mapping between algorithm name and algorithm ID |
||
38 | * |
||
39 | * @var array |
||
40 | * @see https://msdn.microsoft.com/en-us/library/documentformat.openxml.wordprocessing.writeprotection.cryptographicalgorithmsid(v=office.14).aspx |
||
41 | */ |
||
42 | private static $algorithmMapping = array( |
||
43 | self::ALGORITHM_MD2 => array(1, 'md2'), |
||
44 | self::ALGORITHM_MD4 => array(2, 'md4'), |
||
45 | self::ALGORITHM_MD5 => array(3, 'md5'), |
||
46 | self::ALGORITHM_SHA_1 => array(4, 'sha1'), |
||
47 | self::ALGORITHM_MAC => array(5, ''), // 'mac' -> not possible with hash() |
||
48 | self::ALGORITHM_RIPEMD => array(6, 'ripemd'), |
||
49 | self::ALGORITHM_RIPEMD_160 => array(7, 'ripemd160'), |
||
50 | self::ALGORITHM_HMAC => array(9, ''), //'hmac' -> not possible with hash() |
||
51 | self::ALGORITHM_SHA_256 => array(12, 'sha256'), |
||
52 | self::ALGORITHM_SHA_384 => array(13, 'sha384'), |
||
53 | self::ALGORITHM_SHA_512 => array(14, 'sha512'), |
||
54 | ); |
||
55 | |||
56 | private static $initialCodeArray = array( |
||
57 | 0xE1F0, |
||
58 | 0x1D0F, |
||
59 | 0xCC9C, |
||
60 | 0x84C0, |
||
61 | 0x110C, |
||
62 | 0x0E10, |
||
63 | 0xF1CE, |
||
64 | 0x313E, |
||
65 | 0x1872, |
||
66 | 0xE139, |
||
67 | 0xD40F, |
||
68 | 0x84F9, |
||
69 | 0x280C, |
||
70 | 0xA96A, |
||
71 | 0x4EC3, |
||
72 | ); |
||
73 | |||
74 | private static $encryptionMatrix = array( |
||
75 | array(0xAEFC, 0x4DD9, 0x9BB2, 0x2745, 0x4E8A, 0x9D14, 0x2A09), |
||
76 | array(0x7B61, 0xF6C2, 0xFDA5, 0xEB6B, 0xC6F7, 0x9DCF, 0x2BBF), |
||
77 | array(0x4563, 0x8AC6, 0x05AD, 0x0B5A, 0x16B4, 0x2D68, 0x5AD0), |
||
78 | array(0x0375, 0x06EA, 0x0DD4, 0x1BA8, 0x3750, 0x6EA0, 0xDD40), |
||
79 | array(0xD849, 0xA0B3, 0x5147, 0xA28E, 0x553D, 0xAA7A, 0x44D5), |
||
80 | array(0x6F45, 0xDE8A, 0xAD35, 0x4A4B, 0x9496, 0x390D, 0x721A), |
||
81 | array(0xEB23, 0xC667, 0x9CEF, 0x29FF, 0x53FE, 0xA7FC, 0x5FD9), |
||
82 | array(0x47D3, 0x8FA6, 0x0F6D, 0x1EDA, 0x3DB4, 0x7B68, 0xF6D0), |
||
83 | array(0xB861, 0x60E3, 0xC1C6, 0x93AD, 0x377B, 0x6EF6, 0xDDEC), |
||
84 | array(0x45A0, 0x8B40, 0x06A1, 0x0D42, 0x1A84, 0x3508, 0x6A10), |
||
85 | array(0xAA51, 0x4483, 0x8906, 0x022D, 0x045A, 0x08B4, 0x1168), |
||
86 | array(0x76B4, 0xED68, 0xCAF1, 0x85C3, 0x1BA7, 0x374E, 0x6E9C), |
||
87 | array(0x3730, 0x6E60, 0xDCC0, 0xA9A1, 0x4363, 0x86C6, 0x1DAD), |
||
88 | array(0x3331, 0x6662, 0xCCC4, 0x89A9, 0x0373, 0x06E6, 0x0DCC), |
||
89 | array(0x1021, 0x2042, 0x4084, 0x8108, 0x1231, 0x2462, 0x48C4), |
||
90 | ); |
||
91 | |||
92 | private static $passwordMaxLength = 15; |
||
93 | |||
94 | /** |
||
95 | * Create a hashed password that MS Word will be able to work with |
||
96 | * @see https://blogs.msdn.microsoft.com/vsod/2010/04/05/how-to-set-the-editing-restrictions-in-word-using-open-xml-sdk-2-0/ |
||
97 | * |
||
98 | * @param string $password |
||
99 | * @param string $algorithmName |
||
100 | * @param string $salt |
||
101 | * @param int $spinCount |
||
102 | * @return string |
||
103 | */ |
||
104 | 4 | public static function hashPassword($password, $algorithmName = self::ALGORITHM_SHA_1, $salt = null, $spinCount = 10000) |
|
105 | { |
||
106 | 4 | $origEncoding = mb_internal_encoding(); |
|
107 | 4 | mb_internal_encoding('UTF-8'); |
|
108 | |||
109 | 4 | $password = mb_substr($password, 0, min(self::$passwordMaxLength, mb_strlen($password))); |
|
110 | |||
111 | // Get the single-byte values by iterating through the Unicode characters of the truncated password. |
||
112 | // For each character, if the low byte is not equal to 0, take it. Otherwise, take the high byte. |
||
113 | 4 | $passUtf8 = mb_convert_encoding($password, 'UCS-2LE', 'UTF-8'); |
|
114 | 4 | $byteChars = array(); |
|
115 | |||
116 | 4 | for ($i = 0; $i < mb_strlen($password); $i++) { |
|
117 | 4 | $byteChars[$i] = ord(substr($passUtf8, $i * 2, 1)); |
|
118 | |||
119 | 4 | if ($byteChars[$i] == 0) { |
|
120 | 1 | $byteChars[$i] = ord(substr($passUtf8, $i * 2 + 1, 1)); |
|
121 | } |
||
122 | } |
||
123 | |||
124 | // build low-order word and hig-order word and combine them |
||
125 | 4 | $combinedKey = self::buildCombinedKey($byteChars); |
|
126 | // build reversed hexadecimal string |
||
127 | 4 | $hex = str_pad(strtoupper(dechex($combinedKey & 0xFFFFFFFF)), 8, '0', \STR_PAD_LEFT); |
|
128 | 4 | $reversedHex = $hex[6] . $hex[7] . $hex[4] . $hex[5] . $hex[2] . $hex[3] . $hex[0] . $hex[1]; |
|
129 | |||
130 | 4 | $generatedKey = mb_convert_encoding($reversedHex, 'UCS-2LE', 'UTF-8'); |
|
131 | |||
132 | // Implementation Notes List: |
||
133 | // Word requires that the initial hash of the password with the salt not be considered in the count. |
||
134 | // The initial hash of salt + key is not included in the iteration count. |
||
135 | 4 | $algorithm = self::getAlgorithm($algorithmName); |
|
136 | 4 | $generatedKey = hash($algorithm, $salt . $generatedKey, true); |
|
137 | |||
138 | 4 | for ($i = 0; $i < $spinCount; $i++) { |
|
139 | 4 | $generatedKey = hash($algorithm, $generatedKey . pack('CCCC', $i, $i >> 8, $i >> 16, $i >> 24), true); |
|
140 | } |
||
141 | 4 | $generatedKey = base64_encode($generatedKey); |
|
142 | |||
143 | 4 | mb_internal_encoding($origEncoding); |
|
144 | |||
145 | 4 | return $generatedKey; |
|
146 | } |
||
147 | |||
148 | /** |
||
149 | * Get algorithm from self::$algorithmMapping |
||
150 | * |
||
151 | * @param string $algorithmName |
||
152 | * @return string |
||
153 | */ |
||
154 | 4 | private static function getAlgorithm($algorithmName) |
|
155 | { |
||
156 | 4 | $algorithm = self::$algorithmMapping[$algorithmName][1]; |
|
157 | 4 | if ($algorithm == '') { |
|
158 | 2 | $algorithm = 'sha1'; |
|
159 | } |
||
160 | |||
161 | 4 | return $algorithm; |
|
162 | } |
||
163 | |||
164 | /** |
||
165 | * Returns the algorithm ID |
||
166 | * |
||
167 | * @param string $algorithmName |
||
168 | * @return int |
||
169 | */ |
||
170 | public static function getAlgorithmId($algorithmName) |
||
174 | |||
175 | /** |
||
176 | * Build combined key from low-order word and high-order word |
||
177 | * |
||
178 | * @param array $byteChars byte array representation of password |
||
179 | * @return int |
||
180 | */ |
||
181 | 4 | private static function buildCombinedKey($byteChars) |
|
182 | { |
||
183 | 4 | $byteCharsLength = count($byteChars); |
|
184 | // Compute the high-order word |
||
185 | // Initialize from the initial code array (see above), depending on the passwords length. |
||
186 | 4 | $highOrderWord = self::$initialCodeArray[$byteCharsLength - 1]; |
|
187 | |||
188 | // For each character in the password: |
||
189 | // For every bit in the character, starting with the least significant and progressing to (but excluding) |
||
190 | // the most significant, if the bit is set, XOR the key’s high-order word with the corresponding word from |
||
191 | // the Encryption Matrix |
||
192 | 4 | for ($i = 0; $i < $byteCharsLength; $i++) { |
|
193 | 4 | $tmp = self::$passwordMaxLength - $byteCharsLength + $i; |
|
194 | 4 | $matrixRow = self::$encryptionMatrix[$tmp]; |
|
195 | 4 | for ($intBit = 0; $intBit < 7; $intBit++) { |
|
196 | 4 | if (($byteChars[$i] & (0x0001 << $intBit)) != 0) { |
|
197 | 4 | $highOrderWord = ($highOrderWord ^ $matrixRow[$intBit]); |
|
198 | } |
||
199 | } |
||
200 | } |
||
201 | |||
202 | // Compute low-order word |
||
203 | // Initialize with 0 |
||
204 | 4 | $lowOrderWord = 0; |
|
205 | // For each character in the password, going backwards |
||
206 | 4 | for ($i = $byteCharsLength - 1; $i >= 0; $i--) { |
|
207 | // low-order word = (((low-order word SHR 14) AND 0x0001) OR (low-order word SHL 1) AND 0x7FFF)) XOR character |
||
208 | 4 | $lowOrderWord = (((($lowOrderWord >> 14) & 0x0001) | (($lowOrderWord << 1) & 0x7FFF)) ^ $byteChars[$i]); |
|
209 | } |
||
210 | // Lastly, low-order word = (((low-order word SHR 14) AND 0x0001) OR (low-order word SHL 1) AND 0x7FFF)) XOR strPassword length XOR 0xCE4B. |
||
211 | 4 | $lowOrderWord = (((($lowOrderWord >> 14) & 0x0001) | (($lowOrderWord << 1) & 0x7FFF)) ^ $byteCharsLength ^ 0xCE4B); |
|
212 | |||
213 | // Combine the Low and High Order Word |
||
214 | 4 | return self::int32(($highOrderWord << 16) + $lowOrderWord); |
|
215 | } |
||
216 | |||
217 | /** |
||
218 | * Simulate behaviour of (signed) int32 |
||
219 | * |
||
220 | * @codeCoverageIgnore |
||
221 | * @param int $value |
||
222 | * @return int |
||
223 | */ |
||
224 | private static function int32($value) |
||
234 | } |
||
235 |