symphonycms /
symphony-2
| 1 | <?php |
||
| 2 | /** |
||
| 3 | * @package toolkit |
||
| 4 | */ |
||
| 5 | /** |
||
| 6 | * Cryptography is a utility class that offers a number of general purpose cryptography- |
||
| 7 | * related functions for message digestation as well as (backwards-)compatibility |
||
| 8 | * checking. The message digestation algorithms are placed in the subclasses |
||
| 9 | * `MD5`, `SHA1` and `PBKDF2`. |
||
| 10 | * |
||
| 11 | * @since Symphony 2.3.1 |
||
| 12 | * @see cryptography.MD5 |
||
| 13 | * @see cryptography.SHA1 |
||
| 14 | * @see cryptography.PBKDF2 |
||
| 15 | */ |
||
| 16 | |||
| 17 | class Cryptography |
||
| 18 | { |
||
| 19 | /** |
||
| 20 | * Uses an instance of `PBKDF2` to create a hash. If you require other |
||
| 21 | * hashes, see the related functions of the `MD5` or `SHA1` classes |
||
| 22 | * |
||
| 23 | * @see cryptography.MD5#hash() |
||
| 24 | * @see cryptography.SHA1#hash() |
||
| 25 | * @see cryptography.PBKDF2#hash() |
||
| 26 | * |
||
| 27 | * @param string $input |
||
| 28 | * the string to be hashed |
||
| 29 | * @return string |
||
| 30 | * the hashed string |
||
| 31 | */ |
||
| 32 | public static function hash($input) |
||
| 33 | { |
||
| 34 | return PBKDF2::hash($input); |
||
| 35 | } |
||
| 36 | |||
| 37 | /** |
||
| 38 | * Compares a given hash with a clean text password by figuring out the |
||
| 39 | * algorithm that has been used and then calling the appropriate sub-class |
||
| 40 | * |
||
| 41 | * @see cryptography.MD5#compare() |
||
| 42 | * @see cryptography.SHA1#compare() |
||
| 43 | * @see cryptography.PBKDF2#compare() |
||
| 44 | * |
||
| 45 | * @param string $input |
||
| 46 | * the cleartext password |
||
| 47 | * @param string $hash |
||
| 48 | * the hash the password should be checked against |
||
| 49 | * @param boolean $isHash |
||
| 50 | * @return boolean |
||
| 51 | * the result of the comparison |
||
| 52 | */ |
||
| 53 | public static function compare($input, $hash, $isHash = false) |
||
|
0 ignored issues
–
show
Coding Style
introduced
by
Loading history...
|
|||
| 54 | { |
||
| 55 | $version = substr($hash, 0, 8); |
||
| 56 | |||
| 57 | if ($isHash === true) { |
||
| 58 | return $input == $hash; |
||
| 59 | } elseif ($version == 'PBKDF2v1') { // salted PBKDF2 |
||
| 60 | return PBKDF2::compare($input, $hash); |
||
| 61 | } elseif (strlen($hash) == 40) { // legacy, unsalted SHA1 |
||
| 62 | return SHA1::compare($input, $hash); |
||
| 63 | } elseif (strlen($hash) == 32) { // legacy, unsalted MD5 |
||
| 64 | return MD5::compare($input, $hash); |
||
| 65 | } else { // the hash provided doesn't make any sense |
||
| 66 | return false; |
||
| 67 | } |
||
| 68 | } |
||
| 69 | |||
| 70 | /** |
||
| 71 | * Checks if provided hash has been computed by most recent algorithm |
||
| 72 | * returns true if otherwise |
||
| 73 | * |
||
| 74 | * @param string $hash |
||
| 75 | * the hash to be checked |
||
| 76 | * @return boolean |
||
| 77 | * whether the hash should be re-computed |
||
| 78 | */ |
||
| 79 | public static function requiresMigration($hash) |
||
| 80 | { |
||
| 81 | $version = substr($hash, 0, 8); |
||
| 82 | |||
| 83 | if ($version == PBKDF2::PREFIX) { // salted PBKDF2, let the responsible class decide |
||
| 84 | return PBKDF2::requiresMigration($hash); |
||
| 85 | } else { // everything else |
||
| 86 | return true; |
||
| 87 | } |
||
| 88 | } |
||
| 89 | |||
| 90 | /** |
||
| 91 | * Generates a salt to be used in message digestation. |
||
| 92 | * |
||
| 93 | * @param integer $length |
||
| 94 | * the length of the salt |
||
| 95 | * @return string |
||
| 96 | * a hexadecimal string |
||
| 97 | */ |
||
| 98 | public static function generateSalt($length) |
||
| 99 | { |
||
| 100 | mt_srand(intval(microtime(true)*100000 + memory_get_usage(true))); |
||
| 101 | return substr(sha1(uniqid(mt_rand(), true)), 0, $length); |
||
| 102 | } |
||
| 103 | } |
||
| 104 |