| 1 | <?php |
||
| 2 | |||
| 3 | /* |
||
| 4 | * This file is part of the PHP EcryptFS library. |
||
| 5 | * (c) 2017 by Dennis Birkholz |
||
| 6 | * All rights reserved. |
||
| 7 | * For the license to use this library, see the provided LICENSE file. |
||
| 8 | */ |
||
| 9 | |||
| 10 | namespace Iqb\Ecryptfs; |
||
| 11 | |||
| 12 | /** |
||
| 13 | * Provides encryption and decryption primitives using PHP's OpenSSL extension. |
||
| 14 | */ |
||
| 15 | final class OpenSslCryptoEngine implements CryptoEngineInterface |
||
| 16 | { |
||
| 17 | const CIPHER_MAPPING = [ |
||
| 18 | RFC2440_CIPHER_AES_128 => "AES-128-CBC", |
||
| 19 | RFC2440_CIPHER_AES_192 => "AES-192-CBC", |
||
| 20 | RFC2440_CIPHER_AES_256 => "AES-256-CBC", |
||
| 21 | ]; |
||
| 22 | |||
| 23 | /** |
||
| 24 | * Encrypt the supplied data using the specified cipher algorithm. |
||
| 25 | * |
||
| 26 | * @param string $data The plain text data to encrypt, length must be a multiple of the block size of the cipher |
||
| 27 | * @param int $cipherCode One of the RFC2440_CIPHER_* constants specifying the cipher |
||
| 28 | * @param string $key Raw binary key, must match the required key length of the cipher |
||
| 29 | * @param string $iv Initialization vector |
||
| 30 | * @return string |
||
| 31 | */ |
||
| 32 | 36 | final public function encrypt(string $data, int $cipherCode, string $key, string $iv): string |
|
| 33 | { |
||
| 34 | 36 | \assert(isset(self::CIPHER_MAPPING[$cipherCode]), "Cipher 0x" . \dechex($cipherCode) . " not implemented!"); |
|
| 35 | 36 | \assert(\in_array(\strlen($key), CryptoEngineInterface::CIPHER_KEY_SIZES[$cipherCode], true), "Invalid key size specified."); |
|
| 36 | |||
| 37 | 36 | $cipher = self::CIPHER_MAPPING[$cipherCode]; |
|
| 38 | |||
| 39 | 36 | if (false === ($encrypted = \openssl_encrypt($data, $cipher, $key, \OPENSSL_RAW_DATA|\OPENSSL_NO_PADDING, $iv))) { |
|
|
0 ignored issues
–
show
introduced
by
Loading history...
|
|||
| 40 | throw new \RuntimeException("Encryption failed with error: " . \openssl_error_string()); |
||
| 41 | } |
||
| 42 | |||
| 43 | 36 | \assert(($openSslError = \openssl_error_string() !== ''), "OpenSSL error message: $openSslError"); |
|
| 44 | |||
| 45 | 36 | return $encrypted; |
|
| 46 | } |
||
| 47 | |||
| 48 | /** |
||
| 49 | * @param string $data Encrypted data to decrypt, length must be a multiple of the block size of the cipher |
||
| 50 | * @param int $cipherCode One of the RFC2440_CIPHER_* constants specifying the cipher |
||
| 51 | * @param string $key Raw binary key, must match the required key length of the cipher |
||
| 52 | * @param string $iv Initialization vector |
||
| 53 | * @return string |
||
| 54 | */ |
||
| 55 | 36 | final public function decrypt(string $data, int $cipherCode, string $key, string $iv): string |
|
| 56 | { |
||
| 57 | 36 | \assert(isset(self::CIPHER_MAPPING[$cipherCode]), "Cipher 0x" . \dechex($cipherCode) . " not implemented!"); |
|
| 58 | 36 | \assert(\in_array(\strlen($key), CryptoEngineInterface::CIPHER_KEY_SIZES[$cipherCode], true), "Invalid key size specified."); |
|
| 59 | |||
| 60 | 36 | $cipher = self::CIPHER_MAPPING[$cipherCode]; |
|
| 61 | |||
| 62 | 36 | if (false === ($decrypted = \openssl_decrypt($data, $cipher, $key, \OPENSSL_RAW_DATA|\OPENSSL_NO_PADDING, $iv))) { |
|
|
0 ignored issues
–
show
|
|||
| 63 | throw new \RuntimeException("Decryption failed with error: " . \openssl_error_string()); |
||
| 64 | } |
||
| 65 | |||
| 66 | 36 | \assert(($openSslError = \openssl_error_string()) !== '', "OpenSSL error message: $openSslError"); |
|
| 67 | |||
| 68 | 36 | return $decrypted; |
|
| 69 | } |
||
| 70 | } |
||
| 71 |