1 | <?php |
||
2 | /** |
||
3 | * @package toolkit |
||
4 | */ |
||
5 | /** |
||
6 | * Cryptography is a utility class that offers a number of general purpose cryptography- |
||
7 | * related functions for message digestation as well as (backwards-)compatibility |
||
8 | * checking. The message digestation algorithms are placed in the subclasses |
||
9 | * `MD5`, `SHA1` and `PBKDF2`. |
||
10 | * |
||
11 | * @since Symphony 2.3.1 |
||
12 | * @see cryptography.MD5 |
||
13 | * @see cryptography.SHA1 |
||
14 | * @see cryptography.PBKDF2 |
||
15 | */ |
||
16 | |||
17 | class Cryptography |
||
18 | { |
||
19 | /** |
||
20 | * Uses an instance of `PBKDF2` to create a hash. If you require other |
||
21 | * hashes, see the related functions of the `MD5` or `SHA1` classes |
||
22 | * |
||
23 | * @see cryptography.MD5#hash() |
||
24 | * @see cryptography.SHA1#hash() |
||
25 | * @see cryptography.PBKDF2#hash() |
||
26 | * |
||
27 | * @param string $input |
||
28 | * the string to be hashed |
||
29 | * @return string |
||
30 | * the hashed string |
||
31 | */ |
||
32 | public static function hash($input) |
||
33 | { |
||
34 | return PBKDF2::hash($input); |
||
35 | } |
||
36 | |||
37 | /** |
||
38 | * Compares a given hash with a clean text password by figuring out the |
||
39 | * algorithm that has been used and then calling the appropriate sub-class |
||
40 | * |
||
41 | * @see cryptography.MD5#compare() |
||
42 | * @see cryptography.SHA1#compare() |
||
43 | * @see cryptography.PBKDF2#compare() |
||
44 | * |
||
45 | * @param string $input |
||
46 | * the cleartext password |
||
47 | * @param string $hash |
||
48 | * the hash the password should be checked against |
||
49 | * @param boolean $isHash |
||
50 | * @return boolean |
||
51 | * the result of the comparison |
||
52 | */ |
||
53 | public static function compare($input, $hash, $isHash = false) |
||
0 ignored issues
–
show
Coding Style
introduced
by
![]() |
|||
54 | { |
||
55 | $version = substr($hash, 0, 8); |
||
56 | |||
57 | if ($isHash === true) { |
||
58 | return $input == $hash; |
||
59 | } elseif ($version == 'PBKDF2v1') { // salted PBKDF2 |
||
60 | return PBKDF2::compare($input, $hash); |
||
61 | } elseif (strlen($hash) == 40) { // legacy, unsalted SHA1 |
||
62 | return SHA1::compare($input, $hash); |
||
63 | } elseif (strlen($hash) == 32) { // legacy, unsalted MD5 |
||
64 | return MD5::compare($input, $hash); |
||
65 | } else { // the hash provided doesn't make any sense |
||
66 | return false; |
||
67 | } |
||
68 | } |
||
69 | |||
70 | /** |
||
71 | * Checks if provided hash has been computed by most recent algorithm |
||
72 | * returns true if otherwise |
||
73 | * |
||
74 | * @param string $hash |
||
75 | * the hash to be checked |
||
76 | * @return boolean |
||
77 | * whether the hash should be re-computed |
||
78 | */ |
||
79 | public static function requiresMigration($hash) |
||
80 | { |
||
81 | $version = substr($hash, 0, 8); |
||
82 | |||
83 | if ($version == PBKDF2::PREFIX) { // salted PBKDF2, let the responsible class decide |
||
84 | return PBKDF2::requiresMigration($hash); |
||
85 | } else { // everything else |
||
86 | return true; |
||
87 | } |
||
88 | } |
||
89 | |||
90 | /** |
||
91 | * Generates a salt to be used in message digestation. |
||
92 | * |
||
93 | * @param integer $length |
||
94 | * the length of the salt |
||
95 | * @return string |
||
96 | * a hexadecimal string |
||
97 | */ |
||
98 | public static function generateSalt($length) |
||
99 | { |
||
100 | mt_srand(intval(microtime(true)*100000 + memory_get_usage(true))); |
||
101 | return substr(sha1(uniqid(mt_rand(), true)), 0, $length); |
||
102 | } |
||
103 | } |
||
104 |