1
|
|
|
<?php |
2
|
|
|
|
3
|
|
|
/* |
4
|
|
|
* This file is part of the PHP EcryptFS library. |
5
|
|
|
* (c) 2017 by Dennis Birkholz |
6
|
|
|
* All rights reserved. |
7
|
|
|
* For the license to use this library, see the provided LICENSE file. |
8
|
|
|
*/ |
9
|
|
|
|
10
|
|
|
namespace Iqb\Ecryptfs; |
11
|
|
|
|
12
|
|
|
/** |
13
|
|
|
* Provides encryption and decryption primitives using PHP's OpenSSL extension. |
14
|
|
|
*/ |
15
|
|
|
final class OpenSslCryptoEngine implements CryptoEngineInterface |
16
|
|
|
{ |
17
|
|
|
const CIPHER_MAPPING = [ |
18
|
|
|
RFC2440_CIPHER_AES_128 => "AES-128-CBC", |
19
|
|
|
RFC2440_CIPHER_AES_192 => "AES-192-CBC", |
20
|
|
|
RFC2440_CIPHER_AES_256 => "AES-256-CBC", |
21
|
|
|
]; |
22
|
|
|
|
23
|
|
|
/** |
24
|
|
|
* Encrypt the supplied data using the specified cipher algorithm. |
25
|
|
|
* |
26
|
|
|
* @param string $data The plain text data to encrypt, length must be a multiple of the block size of the cipher |
27
|
|
|
* @param int $cipherCode One of the RFC2440_CIPHER_* constants specifying the cipher |
28
|
|
|
* @param string $key Raw binary key, must match the required key length of the cipher |
29
|
|
|
* @param string $iv Initialization vector |
30
|
|
|
* @return string |
31
|
|
|
*/ |
32
|
36 |
|
final public function encrypt(string $data, int $cipherCode, string $key, string $iv): string |
33
|
|
|
{ |
34
|
36 |
|
\assert(isset(self::CIPHER_MAPPING[$cipherCode]), "Cipher 0x" . \dechex($cipherCode) . " not implemented!"); |
35
|
36 |
|
\assert(\in_array(\strlen($key), CryptoEngineInterface::CIPHER_KEY_SIZES[$cipherCode], true), "Invalid key size specified."); |
36
|
|
|
|
37
|
36 |
|
$cipher = self::CIPHER_MAPPING[$cipherCode]; |
38
|
|
|
|
39
|
36 |
|
if (false === ($encrypted = \openssl_encrypt($data, $cipher, $key, \OPENSSL_RAW_DATA|\OPENSSL_NO_PADDING, $iv))) { |
|
|
|
|
40
|
|
|
throw new \RuntimeException("Encryption failed with error: " . \openssl_error_string()); |
41
|
|
|
} |
42
|
|
|
|
43
|
36 |
|
\assert(($openSslError = \openssl_error_string() !== ''), "OpenSSL error message: $openSslError"); |
44
|
|
|
|
45
|
36 |
|
return $encrypted; |
46
|
|
|
} |
47
|
|
|
|
48
|
|
|
/** |
49
|
|
|
* @param string $data Encrypted data to decrypt, length must be a multiple of the block size of the cipher |
50
|
|
|
* @param int $cipherCode One of the RFC2440_CIPHER_* constants specifying the cipher |
51
|
|
|
* @param string $key Raw binary key, must match the required key length of the cipher |
52
|
|
|
* @param string $iv Initialization vector |
53
|
|
|
* @return string |
54
|
|
|
*/ |
55
|
36 |
|
final public function decrypt(string $data, int $cipherCode, string $key, string $iv): string |
56
|
|
|
{ |
57
|
36 |
|
\assert(isset(self::CIPHER_MAPPING[$cipherCode]), "Cipher 0x" . \dechex($cipherCode) . " not implemented!"); |
58
|
36 |
|
\assert(\in_array(\strlen($key), CryptoEngineInterface::CIPHER_KEY_SIZES[$cipherCode], true), "Invalid key size specified."); |
59
|
|
|
|
60
|
36 |
|
$cipher = self::CIPHER_MAPPING[$cipherCode]; |
61
|
|
|
|
62
|
36 |
|
if (false === ($decrypted = \openssl_decrypt($data, $cipher, $key, \OPENSSL_RAW_DATA|\OPENSSL_NO_PADDING, $iv))) { |
|
|
|
|
63
|
|
|
throw new \RuntimeException("Decryption failed with error: " . \openssl_error_string()); |
64
|
|
|
} |
65
|
|
|
|
66
|
36 |
|
\assert(($openSslError = \openssl_error_string()) !== '', "OpenSSL error message: $openSslError"); |
67
|
|
|
|
68
|
36 |
|
return $decrypted; |
69
|
|
|
} |
70
|
|
|
} |
71
|
|
|
|