1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: 34: 35: 36: 37: 38: 39: 40: 41: 42: 43: 44: 45: 46: 47: 48: 49: 50: 51: 52: 53: 54: 55: 56: 57: 58: 59: 60: 61: 62: 63: 64: 65: 66: 67: 68: 69: 70: 71: 72: 73: 74: 75: 76: 77: 78: 79: 80: 81: 82: 83: 84: 85: 86: 87: 88: 89: 90: 91: 92: 93: 94: 95: 96: 97: 98: 99: 100: 101: 102: 103: 104: 105: 106: 107: 108: 109: 110: 111: 112: 113: 114: 115: 116: 117: 118: 119: 120: 121: 122: 123: 124: 125: 126: 127: 128: 129: 130: 131: 132: 133: 134: 135: 136: 137: 138: 139: 140: 141: 142: 143: 144: 145: 146: 147: 148: 149: 150: 151: 152: 153: 154: 155: 156: 157: 158: 159: 160: 161: 162: 163: 164: 165: 166: 167: 168: 169: 170: 171: 172: 173: 174: 175: 176: 177: 178: 179: 180: 181: 182: 183: 184: 185: 186: 187: 188: 189: 190: 191: 192: 193: 194: 195: 196: 197: 198: 199: 200: 201: 202: 203: 204: 205: 206: 207: 208: 209: 210: 211: 212: 213: 214: 215: 216: 217: 218: 219: 220: 221: 222: 223: 224: 225: 226: 227: 228: 229: 230: 231: 232: 233: 234: 235: 236: 237: 238: 239: 240: 241: 242: 243: 244: 245: 246: 247: 248: 249: 250: 251: 252: 253: 254: 255: 256: 257: 258: 259: 260: 261: 262: 263: 264: 265: 266: 267: 268: 269: 270: 271: 272: 273: 274: 275: 276: 277: 278: 279: 280: 281: 282: 283: 284: 285: 286: 287: 288: 289: 290: 291: 292: 293: 294: 295: 296: 297: 298: 299: 300: 301: 302: 303: 304: 305: 306: 307: 308: 309: 310: 311: 312: 313: 314: 315: 316: 317: 318: 319: 320: 321: 322: 323: 324: 325: 326: 327: 328: 329: 330: 331: 332: 333: 334: 335: 336: 337: 338: 339: 340: 341: 342: 343: 344: 345: 346: 347: 348: 349: 350: 351: 352: 353: 354: 355: 356: 357: 358: 359: 360: 361: 362: 363: 364: 365: 366: 367: 368: 369: 370: 371: 372: 373: 374: 375: 376: 377: 378: 379: 380: 381: 382: 383: 384: 385: 386: 387: 388: 389: 390: 391: 392: 393: 394: 395: 396: 397: 398: 399: 400: 401: 402: 403: 404: 405: 406: 407: 408: 409: 410: 411: 412: 413: 414: 415: 416: 417: 418: 419: 420: 421: 422: 423: 424: 425: 426: 427: 428: 429: 430: 431: 432: 433: 434:
<?php
final class icms_core_Password {
private $pass, $salt, $mainSalt = XOOPS_DB_SALT, $uname;
public function __construct() {
}
static public function getInstance() {
static $instance;
if (!isset($instance)) {
$instance = new icms_core_Password();
}
return $instance;
}
static public function createSalt($slength=64) {
$salt = '';
$base = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ';
$microtime = function_exists('microtime') ? microtime() : time();
mt_srand((double)$microtime * 1000000);
for ($i=0; $i<=$slength; $i++)
$salt.= substr($base, mt_rand(0, strlen($base)), 1);
return $salt;
}
public function createCryptoKey($slength = 64) {
if (function_exists('openssl_random_pseudo_bytes')) {
$key = openssl_random_pseudo_bytes($slength, $strong);
if ($strong === TRUE) {
return $key;
} else {
return self::createCryptoKey($slength);
}
} else {
return self::createSalt($slength);
}
}
public function passExpired($uname = '') {
if (empty($uname)) {
redirect_header('user.php', 2, _US_SORRYNOTFOUND);
}
return self::_passExpired($uname);
}
public function getUserSalt($uname = '') {
if (empty($uname)) {
redirect_header('user.php', 2, _US_SORRYNOTFOUND);
}
return self::_getUserSalt($uname);
}
public function getUserEncType($uname = '') {
if (empty($uname)) {
redirect_header('user.php', 2, _US_SORRYNOTFOUND);
}
return self::_getUserEncType($uname);
}
public function encryptPass($pass) {
global $icmsConfigUser;
$salt = self::createSalt();
$iterations = 5000;
$enc_type = (isset($icmsConfigUser['enc_type']) ? (int) $icmsConfigUser['enc_type'] : 23);
return self::_encryptPassword($pass, $salt, $enc_type, $iterations);
}
public function verifyPass($pass = '', $uname = '') {
if (!isset($pass) || !isset($uname)) {
return false;
}
return self::_verifyPassword($pass, $uname);
}
private function _passExpired($uname) {
$uname = @htmlspecialchars($uname, ENT_QUOTES, _CHARSET);
$table = new icms_db_legacy_updater_Table('users');
if ($table->fieldExists('loginname')) {
$sql = icms::$xoopsDB->query(sprintf("SELECT pass_expired FROM %s WHERE loginname = %s",
icms::$xoopsDB->prefix('users'), icms::$xoopsDB->quoteString($uname)));
list($pass_expired) = icms::$xoopsDB->fetchRow($sql);
} elseif ($table->fieldExists('login_name')) {
$sql = icms::$xoopsDB->query(sprintf("SELECT pass_expired FROM %s WHERE login_name = %s",
icms::$xoopsDB->prefix('users'), icms::$xoopsDB->quoteString($uname)));
list($pass_expired) = icms::$xoopsDB->fetchRow($sql);
} else {
$sql = icms::$xoopsDB->query(sprintf("SELECT pass_expired FROM %s WHERE uname = %s",
icms::$xoopsDB->prefix('users'), icms::$xoopsDB->quoteString($uname)));
list($pass_expired) = icms::$xoopsDB->fetchRow($sql);
}
if ($pass_expired == 1) {
return true;
} else {
return false;
}
}
private function _getUserSalt($uname) {
$table = new icms_db_legacy_updater_Table('users');
$uname = @htmlspecialchars($uname, ENT_QUOTES, _CHARSET);
if ($table->fieldExists('loginname')) {
$sql = icms::$xoopsDB->query(sprintf("SELECT salt FROM %s WHERE loginname = %s",
icms::$xoopsDB->prefix('users'), icms::$xoopsDB->quoteString($uname)));
list($salt) = icms::$xoopsDB->fetchRow($sql);
} elseif ($table->fieldExists('login_name')) {
$sql = icms::$xoopsDB->query(sprintf("SELECT salt FROM %s WHERE login_name = %s",
icms::$xoopsDB->prefix('users'), icms::$xoopsDB->quoteString($uname)));
list($salt) = icms::$xoopsDB->fetchRow($sql);
} else {
$sql = icms::$xoopsDB->query(sprintf("SELECT salt FROM %s WHERE uname = %s",
icms::$xoopsDB->prefix('users'), icms::$xoopsDB->quoteString($uname)));
list($salt) = icms::$xoopsDB->fetchRow($sql);
}
return $salt;
}
private function _getUserEncType($uname) {
$table = new icms_db_legacy_updater_Table('users');
$uname = @htmlspecialchars($uname, ENT_QUOTES, _CHARSET);
if($table->fieldExists('loginname')) {
$sql = icms::$xoopsDB->query(sprintf("SELECT enc_type FROM %s WHERE loginname = %s",
icms::$xoopsDB->prefix('users'), icms::$xoopsDB->quoteString($uname)));
list($enc_type) = icms::$xoopsDB->fetchRow($sql);
} elseif($table->fieldExists('login_name')) {
$sql = icms::$xoopsDB->query(sprintf("SELECT enc_type FROM %s WHERE login_name = %s",
icms::$xoopsDB->prefix('users'), icms::$xoopsDB->quoteString($uname)));
list($enc_type) = icms::$xoopsDB->fetchRow($sql);
} else {
$sql = icms::$xoopsDB->query(sprintf("SELECT enc_type FROM %s WHERE uname = %s",
icms::$xoopsDB->prefix('users'), icms::$xoopsDB->quoteString($uname)));
list($enc_type) = icms::$xoopsDB->fetchRow($sql);
}
return (int) $enc_type;
}
private function _getUserHash($uname) {
if (empty($uname)) {
redirect_header('user.php', 2, _US_SORRYNOTFOUND);
}
$table = new icms_db_legacy_updater_Table('users');
$uname = @htmlspecialchars($uname, ENT_QUOTES, _CHARSET);
if($table->fieldExists('loginname')) {
$sql = icms::$xoopsDB->query(sprintf("SELECT pass FROM %s WHERE loginname = %s",
icms::$xoopsDB->prefix('users'), icms::$xoopsDB->quoteString($uname)));
list($pass) = icms::$xoopsDB->fetchRow($sql);
} elseif($table->fieldExists('login_name')) {
$sql = icms::$xoopsDB->query(sprintf("SELECT pass FROM %s WHERE login_name = %s",
icms::$xoopsDB->prefix('users'), icms::$xoopsDB->quoteString($uname)));
list($pass) = icms::$xoopsDB->fetchRow($sql);
} else {
$sql = icms::$xoopsDB->query(sprintf("SELECT pass FROM %s WHERE uname = %s",
icms::$xoopsDB->prefix('users'), icms::$xoopsDB->quoteString($uname)));
list($pass) = icms::$xoopsDB->fetchRow($sql);
}
return $pass;
}
private function _encryptPass($pass, $salt, $enc_type) {
if ($enc_type === 0) {
return md5($pass);
} else {
$pass = $salt . md5($pass) . $this->mainSalt;
$type = array();
$type['encType'] = array(
1 => 'sha256',
2 => 'sha384',
3 => 'sha512',
4 => 'ripemd128',
5 => 'ripemd160',
6 => 'whirlpool',
7 => 'haval128,4',
8 => 'haval160,4',
9 => 'haval192,4',
10 => 'haval224,4',
11 => 'haval256,4',
12 => 'haval128,5',
13 => 'haval160,5',
14 => 'haval192,5',
15 => 'haval224,5',
16 => 'haval256,5',
);
return hash($type['encType'][$enc_type], $pass);
}
}
private function _encryptPassword($pass, $salt, $enc_type, $iterations) {
if ($enc_type == 20) {
return '$' . $enc_type . '$20$' . md5($pass);
} else {
$hash = '$' . $enc_type . '$' . $iterations . '$' . $salt . '-' . self::_rehash(
self::_rehash($salt, $iterations) .
self::_rehash($pass, $iterations) .
self::_rehash($this->mainSalt, $iterations),
$iterations, $enc_type);
return $hash;
}
}
private function _rehash($hash, $iterations, $enc_type = 21) {
$type['encType'] = array(
21 => 'sha256',
22 => 'sha384',
23 => 'sha512',
24 => 'ripemd128',
25 => 'ripemd160',
26 => 'whirlpool',
27 => 'haval128,4',
28 => 'haval160,4',
29 => 'haval192,4',
30 => 'haval224,4',
31 => 'haval256,4',
32 => 'haval128,5',
33 => 'haval160,5',
34 => 'haval192,5',
35 => 'haval224,5',
36 => 'haval256,5',
37 => 'ripemd256',
38 => 'ripemd320',
39 => 'snefru256',
40 => 'gost'
);
for ($i = 0; $i < $iterations; ++$i) {
$hashed = hash($type['encType'][$enc_type], $hash . $hash);
}
return $hashed;
}
private function _verifyPassword($pass, $uname) {
$userSalt = self::_getUserSalt($uname);
$userHash = self::_getUserHash($uname);
if(preg_match_all("/(\\$)(\\d+)(\\$)(\\d+)(\\$)((?:[a-z0-9_]*))(-)((?:[a-z0-9_]*))/is", $userHash, $matches)) {
$encType = (int) $matches[2][0];
$iterations = (int) $matches[4][0];
$userSalt = $matches[6][0];
if (self::_encryptPassword($pass, $userSalt, $encType, $iterations) === $userHash) {
return $userHash;
}
} else {
$encType = self::_getUserEncType($uname);
if (self::_encryptPass($pass, $userSalt, $encType) === $userHash) {
return $userHash;
}
}
return false;
}
}