removed Blowfish encryption because of bad performance
This commit is contained in:
parent
79334951a4
commit
0ac4c8800d
|
@ -1,3 +1,8 @@
|
||||||
|
??? 0.5.rc2
|
||||||
|
- fixed bugs:
|
||||||
|
-> removed Blowfish encryption (bad performance)
|
||||||
|
|
||||||
|
|
||||||
08.08.2005 0.5.rc1
|
08.08.2005 0.5.rc1
|
||||||
- Kolab 2 support
|
- Kolab 2 support
|
||||||
- added manager and post office box for inetOrgPerson
|
- added manager and post office box for inetOrgPerson
|
||||||
|
|
|
@ -13,8 +13,7 @@ Installation Instructions for LAM
|
||||||
|
|
||||||
MHash is only needed if you use PHP < 4.3 and want to use SHA or SSHA
|
MHash is only needed if you use PHP < 4.3 and want to use SHA or SSHA
|
||||||
for password hashes.
|
for password hashes.
|
||||||
MCrypt will be used if available, otherwise Blowfish will be used
|
MCrypt will be used to store your LDAP password encrypted in the session file.
|
||||||
to store your LDAP password in the session file.
|
|
||||||
|
|
||||||
Getting mcrypt and mhash for Suse/RedHat:
|
Getting mcrypt and mhash for Suse/RedHat:
|
||||||
|
|
||||||
|
|
|
@ -60,7 +60,7 @@ LAM - Readme
|
||||||
|
|
||||||
LAM needs to store your LDAP user name + password in the session. The session
|
LAM needs to store your LDAP user name + password in the session. The session
|
||||||
files are saved in sess/ and are accessible only by the web server. To increase
|
files are saved in sess/ and are accessible only by the web server. To increase
|
||||||
security username and password are encrypted with MCrypt/AES or Blowfish.
|
security username and password are encrypted with MCrypt/AES if available.
|
||||||
The key and IV are generated at random when you log in. They are stored in two
|
The key and IV are generated at random when you log in. They are stored in two
|
||||||
cookies.
|
cookies.
|
||||||
|
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
0.5.rc1
|
0.5.rc2
|
||||||
|
|
|
@ -21,31 +21,12 @@ The complete license can be found in the file COPYING.
|
||||||
|
|
||||||
Some parts of this package have other, compatible licences. These are:
|
Some parts of this package have other, compatible licences. These are:
|
||||||
|
|
||||||
A: GNU Lesser General Public License
|
A: Freeware
|
||||||
|
|
||||||
This library is free software; you can redistribute it and/or
|
|
||||||
modify it under the terms of the GNU Lesser General Public
|
|
||||||
License as published by the Free Software Foundation; either
|
|
||||||
version 2.1 of the License, or (at your option) any later version.
|
|
||||||
|
|
||||||
This library is distributed in the hope that it will be useful,
|
|
||||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
||||||
Lesser General Public License for more details.
|
|
||||||
|
|
||||||
You should have received a copy of the GNU Lesser General Public
|
|
||||||
License along with this library; if not, write to the Free Software
|
|
||||||
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
||||||
|
|
||||||
The complete license can be found in the file docs/LGPL-license.txt.
|
|
||||||
|
|
||||||
|
|
||||||
B: Freeware
|
|
||||||
|
|
||||||
You may use, modify and redistribute this software as you wish.
|
You may use, modify and redistribute this software as you wish.
|
||||||
|
|
||||||
|
|
||||||
C:
|
B:
|
||||||
|
|
||||||
Copyright (c) 2003 by Bitstream, Inc. All Rights Reserved. Bitstream
|
Copyright (c) 2003 by Bitstream, Inc. All Rights Reserved. Bitstream
|
||||||
Vera is a trademark of Bitstream, Inc.
|
Vera is a trademark of Bitstream, Inc.
|
||||||
|
@ -99,6 +80,5 @@ C:
|
||||||
Programs and licenses with other licenses and/or authors than the
|
Programs and licenses with other licenses and/or authors than the
|
||||||
main license and authors:
|
main license and authors:
|
||||||
|
|
||||||
lib/blowfish.inc A 2002-2003 Mike Cochrane
|
lib/fpdf.php A 2003 Olivier Plathey
|
||||||
lib/fpdf.php B 2003 Olivier Plathey
|
lib/font/Vera* B 2003 Bitstream, Inc.
|
||||||
lib/font/Vera* C 2003 Bitstream, Inc.
|
|
||||||
|
|
|
@ -1,502 +0,0 @@
|
||||||
GNU LESSER GENERAL PUBLIC LICENSE
|
|
||||||
Version 2.1, February 1999
|
|
||||||
|
|
||||||
Copyright (C) 1991, 1999 Free Software Foundation, Inc.
|
|
||||||
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
||||||
Everyone is permitted to copy and distribute verbatim copies
|
|
||||||
of this license document, but changing it is not allowed.
|
|
||||||
|
|
||||||
[This is the first released version of the Lesser GPL. It also counts
|
|
||||||
as the successor of the GNU Library Public License, version 2, hence
|
|
||||||
the version number 2.1.]
|
|
||||||
|
|
||||||
Preamble
|
|
||||||
|
|
||||||
The licenses for most software are designed to take away your
|
|
||||||
freedom to share and change it. By contrast, the GNU General Public
|
|
||||||
Licenses are intended to guarantee your freedom to share and change
|
|
||||||
free software--to make sure the software is free for all its users.
|
|
||||||
|
|
||||||
This license, the Lesser General Public License, applies to some
|
|
||||||
specially designated software packages--typically libraries--of the
|
|
||||||
Free Software Foundation and other authors who decide to use it. You
|
|
||||||
can use it too, but we suggest you first think carefully about whether
|
|
||||||
this license or the ordinary General Public License is the better
|
|
||||||
strategy to use in any particular case, based on the explanations below.
|
|
||||||
|
|
||||||
When we speak of free software, we are referring to freedom of use,
|
|
||||||
not price. Our General Public Licenses are designed to make sure that
|
|
||||||
you have the freedom to distribute copies of free software (and charge
|
|
||||||
for this service if you wish); that you receive source code or can get
|
|
||||||
it if you want it; that you can change the software and use pieces of
|
|
||||||
it in new free programs; and that you are informed that you can do
|
|
||||||
these things.
|
|
||||||
|
|
||||||
To protect your rights, we need to make restrictions that forbid
|
|
||||||
distributors to deny you these rights or to ask you to surrender these
|
|
||||||
rights. These restrictions translate to certain responsibilities for
|
|
||||||
you if you distribute copies of the library or if you modify it.
|
|
||||||
|
|
||||||
For example, if you distribute copies of the library, whether gratis
|
|
||||||
or for a fee, you must give the recipients all the rights that we gave
|
|
||||||
you. You must make sure that they, too, receive or can get the source
|
|
||||||
code. If you link other code with the library, you must provide
|
|
||||||
complete object files to the recipients, so that they can relink them
|
|
||||||
with the library after making changes to the library and recompiling
|
|
||||||
it. And you must show them these terms so they know their rights.
|
|
||||||
|
|
||||||
We protect your rights with a two-step method: (1) we copyright the
|
|
||||||
library, and (2) we offer you this license, which gives you legal
|
|
||||||
permission to copy, distribute and/or modify the library.
|
|
||||||
|
|
||||||
To protect each distributor, we want to make it very clear that
|
|
||||||
there is no warranty for the free library. Also, if the library is
|
|
||||||
modified by someone else and passed on, the recipients should know
|
|
||||||
that what they have is not the original version, so that the original
|
|
||||||
author's reputation will not be affected by problems that might be
|
|
||||||
introduced by others.
|
|
||||||
|
|
||||||
Finally, software patents pose a constant threat to the existence of
|
|
||||||
any free program. We wish to make sure that a company cannot
|
|
||||||
effectively restrict the users of a free program by obtaining a
|
|
||||||
restrictive license from a patent holder. Therefore, we insist that
|
|
||||||
any patent license obtained for a version of the library must be
|
|
||||||
consistent with the full freedom of use specified in this license.
|
|
||||||
|
|
||||||
Most GNU software, including some libraries, is covered by the
|
|
||||||
ordinary GNU General Public License. This license, the GNU Lesser
|
|
||||||
General Public License, applies to certain designated libraries, and
|
|
||||||
is quite different from the ordinary General Public License. We use
|
|
||||||
this license for certain libraries in order to permit linking those
|
|
||||||
libraries into non-free programs.
|
|
||||||
|
|
||||||
When a program is linked with a library, whether statically or using
|
|
||||||
a shared library, the combination of the two is legally speaking a
|
|
||||||
combined work, a derivative of the original library. The ordinary
|
|
||||||
General Public License therefore permits such linking only if the
|
|
||||||
entire combination fits its criteria of freedom. The Lesser General
|
|
||||||
Public License permits more lax criteria for linking other code with
|
|
||||||
the library.
|
|
||||||
|
|
||||||
We call this license the "Lesser" General Public License because it
|
|
||||||
does Less to protect the user's freedom than the ordinary General
|
|
||||||
Public License. It also provides other free software developers Less
|
|
||||||
of an advantage over competing non-free programs. These disadvantages
|
|
||||||
are the reason we use the ordinary General Public License for many
|
|
||||||
libraries. However, the Lesser license provides advantages in certain
|
|
||||||
special circumstances.
|
|
||||||
|
|
||||||
For example, on rare occasions, there may be a special need to
|
|
||||||
encourage the widest possible use of a certain library, so that it becomes
|
|
||||||
a de-facto standard. To achieve this, non-free programs must be
|
|
||||||
allowed to use the library. A more frequent case is that a free
|
|
||||||
library does the same job as widely used non-free libraries. In this
|
|
||||||
case, there is little to gain by limiting the free library to free
|
|
||||||
software only, so we use the Lesser General Public License.
|
|
||||||
|
|
||||||
In other cases, permission to use a particular library in non-free
|
|
||||||
programs enables a greater number of people to use a large body of
|
|
||||||
free software. For example, permission to use the GNU C Library in
|
|
||||||
non-free programs enables many more people to use the whole GNU
|
|
||||||
operating system, as well as its variant, the GNU/Linux operating
|
|
||||||
system.
|
|
||||||
|
|
||||||
Although the Lesser General Public License is Less protective of the
|
|
||||||
users' freedom, it does ensure that the user of a program that is
|
|
||||||
linked with the Library has the freedom and the wherewithal to run
|
|
||||||
that program using a modified version of the Library.
|
|
||||||
|
|
||||||
The precise terms and conditions for copying, distribution and
|
|
||||||
modification follow. Pay close attention to the difference between a
|
|
||||||
"work based on the library" and a "work that uses the library". The
|
|
||||||
former contains code derived from the library, whereas the latter must
|
|
||||||
be combined with the library in order to run.
|
|
||||||
|
|
||||||
GNU LESSER GENERAL PUBLIC LICENSE
|
|
||||||
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
|
||||||
|
|
||||||
0. This License Agreement applies to any software library or other
|
|
||||||
program which contains a notice placed by the copyright holder or
|
|
||||||
other authorized party saying it may be distributed under the terms of
|
|
||||||
this Lesser General Public License (also called "this License").
|
|
||||||
Each licensee is addressed as "you".
|
|
||||||
|
|
||||||
A "library" means a collection of software functions and/or data
|
|
||||||
prepared so as to be conveniently linked with application programs
|
|
||||||
(which use some of those functions and data) to form executables.
|
|
||||||
|
|
||||||
The "Library", below, refers to any such software library or work
|
|
||||||
which has been distributed under these terms. A "work based on the
|
|
||||||
Library" means either the Library or any derivative work under
|
|
||||||
copyright law: that is to say, a work containing the Library or a
|
|
||||||
portion of it, either verbatim or with modifications and/or translated
|
|
||||||
straightforwardly into another language. (Hereinafter, translation is
|
|
||||||
included without limitation in the term "modification".)
|
|
||||||
|
|
||||||
"Source code" for a work means the preferred form of the work for
|
|
||||||
making modifications to it. For a library, complete source code means
|
|
||||||
all the source code for all modules it contains, plus any associated
|
|
||||||
interface definition files, plus the scripts used to control compilation
|
|
||||||
and installation of the library.
|
|
||||||
|
|
||||||
Activities other than copying, distribution and modification are not
|
|
||||||
covered by this License; they are outside its scope. The act of
|
|
||||||
running a program using the Library is not restricted, and output from
|
|
||||||
such a program is covered only if its contents constitute a work based
|
|
||||||
on the Library (independent of the use of the Library in a tool for
|
|
||||||
writing it). Whether that is true depends on what the Library does
|
|
||||||
and what the program that uses the Library does.
|
|
||||||
|
|
||||||
1. You may copy and distribute verbatim copies of the Library's
|
|
||||||
complete source code as you receive it, in any medium, provided that
|
|
||||||
you conspicuously and appropriately publish on each copy an
|
|
||||||
appropriate copyright notice and disclaimer of warranty; keep intact
|
|
||||||
all the notices that refer to this License and to the absence of any
|
|
||||||
warranty; and distribute a copy of this License along with the
|
|
||||||
Library.
|
|
||||||
|
|
||||||
You may charge a fee for the physical act of transferring a copy,
|
|
||||||
and you may at your option offer warranty protection in exchange for a
|
|
||||||
fee.
|
|
||||||
|
|
||||||
2. You may modify your copy or copies of the Library or any portion
|
|
||||||
of it, thus forming a work based on the Library, and copy and
|
|
||||||
distribute such modifications or work under the terms of Section 1
|
|
||||||
above, provided that you also meet all of these conditions:
|
|
||||||
|
|
||||||
a) The modified work must itself be a software library.
|
|
||||||
|
|
||||||
b) You must cause the files modified to carry prominent notices
|
|
||||||
stating that you changed the files and the date of any change.
|
|
||||||
|
|
||||||
c) You must cause the whole of the work to be licensed at no
|
|
||||||
charge to all third parties under the terms of this License.
|
|
||||||
|
|
||||||
d) If a facility in the modified Library refers to a function or a
|
|
||||||
table of data to be supplied by an application program that uses
|
|
||||||
the facility, other than as an argument passed when the facility
|
|
||||||
is invoked, then you must make a good faith effort to ensure that,
|
|
||||||
in the event an application does not supply such function or
|
|
||||||
table, the facility still operates, and performs whatever part of
|
|
||||||
its purpose remains meaningful.
|
|
||||||
|
|
||||||
(For example, a function in a library to compute square roots has
|
|
||||||
a purpose that is entirely well-defined independent of the
|
|
||||||
application. Therefore, Subsection 2d requires that any
|
|
||||||
application-supplied function or table used by this function must
|
|
||||||
be optional: if the application does not supply it, the square
|
|
||||||
root function must still compute square roots.)
|
|
||||||
|
|
||||||
These requirements apply to the modified work as a whole. If
|
|
||||||
identifiable sections of that work are not derived from the Library,
|
|
||||||
and can be reasonably considered independent and separate works in
|
|
||||||
themselves, then this License, and its terms, do not apply to those
|
|
||||||
sections when you distribute them as separate works. But when you
|
|
||||||
distribute the same sections as part of a whole which is a work based
|
|
||||||
on the Library, the distribution of the whole must be on the terms of
|
|
||||||
this License, whose permissions for other licensees extend to the
|
|
||||||
entire whole, and thus to each and every part regardless of who wrote
|
|
||||||
it.
|
|
||||||
|
|
||||||
Thus, it is not the intent of this section to claim rights or contest
|
|
||||||
your rights to work written entirely by you; rather, the intent is to
|
|
||||||
exercise the right to control the distribution of derivative or
|
|
||||||
collective works based on the Library.
|
|
||||||
|
|
||||||
In addition, mere aggregation of another work not based on the Library
|
|
||||||
with the Library (or with a work based on the Library) on a volume of
|
|
||||||
a storage or distribution medium does not bring the other work under
|
|
||||||
the scope of this License.
|
|
||||||
|
|
||||||
3. You may opt to apply the terms of the ordinary GNU General Public
|
|
||||||
License instead of this License to a given copy of the Library. To do
|
|
||||||
this, you must alter all the notices that refer to this License, so
|
|
||||||
that they refer to the ordinary GNU General Public License, version 2,
|
|
||||||
instead of to this License. (If a newer version than version 2 of the
|
|
||||||
ordinary GNU General Public License has appeared, then you can specify
|
|
||||||
that version instead if you wish.) Do not make any other change in
|
|
||||||
these notices.
|
|
||||||
|
|
||||||
Once this change is made in a given copy, it is irreversible for
|
|
||||||
that copy, so the ordinary GNU General Public License applies to all
|
|
||||||
subsequent copies and derivative works made from that copy.
|
|
||||||
|
|
||||||
This option is useful when you wish to copy part of the code of
|
|
||||||
the Library into a program that is not a library.
|
|
||||||
|
|
||||||
4. You may copy and distribute the Library (or a portion or
|
|
||||||
derivative of it, under Section 2) in object code or executable form
|
|
||||||
under the terms of Sections 1 and 2 above provided that you accompany
|
|
||||||
it with the complete corresponding machine-readable source code, which
|
|
||||||
must be distributed under the terms of Sections 1 and 2 above on a
|
|
||||||
medium customarily used for software interchange.
|
|
||||||
|
|
||||||
If distribution of object code is made by offering access to copy
|
|
||||||
from a designated place, then offering equivalent access to copy the
|
|
||||||
source code from the same place satisfies the requirement to
|
|
||||||
distribute the source code, even though third parties are not
|
|
||||||
compelled to copy the source along with the object code.
|
|
||||||
|
|
||||||
5. A program that contains no derivative of any portion of the
|
|
||||||
Library, but is designed to work with the Library by being compiled or
|
|
||||||
linked with it, is called a "work that uses the Library". Such a
|
|
||||||
work, in isolation, is not a derivative work of the Library, and
|
|
||||||
therefore falls outside the scope of this License.
|
|
||||||
|
|
||||||
However, linking a "work that uses the Library" with the Library
|
|
||||||
creates an executable that is a derivative of the Library (because it
|
|
||||||
contains portions of the Library), rather than a "work that uses the
|
|
||||||
library". The executable is therefore covered by this License.
|
|
||||||
Section 6 states terms for distribution of such executables.
|
|
||||||
|
|
||||||
When a "work that uses the Library" uses material from a header file
|
|
||||||
that is part of the Library, the object code for the work may be a
|
|
||||||
derivative work of the Library even though the source code is not.
|
|
||||||
Whether this is true is especially significant if the work can be
|
|
||||||
linked without the Library, or if the work is itself a library. The
|
|
||||||
threshold for this to be true is not precisely defined by law.
|
|
||||||
|
|
||||||
If such an object file uses only numerical parameters, data
|
|
||||||
structure layouts and accessors, and small macros and small inline
|
|
||||||
functions (ten lines or less in length), then the use of the object
|
|
||||||
file is unrestricted, regardless of whether it is legally a derivative
|
|
||||||
work. (Executables containing this object code plus portions of the
|
|
||||||
Library will still fall under Section 6.)
|
|
||||||
|
|
||||||
Otherwise, if the work is a derivative of the Library, you may
|
|
||||||
distribute the object code for the work under the terms of Section 6.
|
|
||||||
Any executables containing that work also fall under Section 6,
|
|
||||||
whether or not they are linked directly with the Library itself.
|
|
||||||
|
|
||||||
6. As an exception to the Sections above, you may also combine or
|
|
||||||
link a "work that uses the Library" with the Library to produce a
|
|
||||||
work containing portions of the Library, and distribute that work
|
|
||||||
under terms of your choice, provided that the terms permit
|
|
||||||
modification of the work for the customer's own use and reverse
|
|
||||||
engineering for debugging such modifications.
|
|
||||||
|
|
||||||
You must give prominent notice with each copy of the work that the
|
|
||||||
Library is used in it and that the Library and its use are covered by
|
|
||||||
this License. You must supply a copy of this License. If the work
|
|
||||||
during execution displays copyright notices, you must include the
|
|
||||||
copyright notice for the Library among them, as well as a reference
|
|
||||||
directing the user to the copy of this License. Also, you must do one
|
|
||||||
of these things:
|
|
||||||
|
|
||||||
a) Accompany the work with the complete corresponding
|
|
||||||
machine-readable source code for the Library including whatever
|
|
||||||
changes were used in the work (which must be distributed under
|
|
||||||
Sections 1 and 2 above); and, if the work is an executable linked
|
|
||||||
with the Library, with the complete machine-readable "work that
|
|
||||||
uses the Library", as object code and/or source code, so that the
|
|
||||||
user can modify the Library and then relink to produce a modified
|
|
||||||
executable containing the modified Library. (It is understood
|
|
||||||
that the user who changes the contents of definitions files in the
|
|
||||||
Library will not necessarily be able to recompile the application
|
|
||||||
to use the modified definitions.)
|
|
||||||
|
|
||||||
b) Use a suitable shared library mechanism for linking with the
|
|
||||||
Library. A suitable mechanism is one that (1) uses at run time a
|
|
||||||
copy of the library already present on the user's computer system,
|
|
||||||
rather than copying library functions into the executable, and (2)
|
|
||||||
will operate properly with a modified version of the library, if
|
|
||||||
the user installs one, as long as the modified version is
|
|
||||||
interface-compatible with the version that the work was made with.
|
|
||||||
|
|
||||||
c) Accompany the work with a written offer, valid for at
|
|
||||||
least three years, to give the same user the materials
|
|
||||||
specified in Subsection 6a, above, for a charge no more
|
|
||||||
than the cost of performing this distribution.
|
|
||||||
|
|
||||||
d) If distribution of the work is made by offering access to copy
|
|
||||||
from a designated place, offer equivalent access to copy the above
|
|
||||||
specified materials from the same place.
|
|
||||||
|
|
||||||
e) Verify that the user has already received a copy of these
|
|
||||||
materials or that you have already sent this user a copy.
|
|
||||||
|
|
||||||
For an executable, the required form of the "work that uses the
|
|
||||||
Library" must include any data and utility programs needed for
|
|
||||||
reproducing the executable from it. However, as a special exception,
|
|
||||||
the materials to be distributed need not include anything that is
|
|
||||||
normally distributed (in either source or binary form) with the major
|
|
||||||
components (compiler, kernel, and so on) of the operating system on
|
|
||||||
which the executable runs, unless that component itself accompanies
|
|
||||||
the executable.
|
|
||||||
|
|
||||||
It may happen that this requirement contradicts the license
|
|
||||||
restrictions of other proprietary libraries that do not normally
|
|
||||||
accompany the operating system. Such a contradiction means you cannot
|
|
||||||
use both them and the Library together in an executable that you
|
|
||||||
distribute.
|
|
||||||
|
|
||||||
7. You may place library facilities that are a work based on the
|
|
||||||
Library side-by-side in a single library together with other library
|
|
||||||
facilities not covered by this License, and distribute such a combined
|
|
||||||
library, provided that the separate distribution of the work based on
|
|
||||||
the Library and of the other library facilities is otherwise
|
|
||||||
permitted, and provided that you do these two things:
|
|
||||||
|
|
||||||
a) Accompany the combined library with a copy of the same work
|
|
||||||
based on the Library, uncombined with any other library
|
|
||||||
facilities. This must be distributed under the terms of the
|
|
||||||
Sections above.
|
|
||||||
|
|
||||||
b) Give prominent notice with the combined library of the fact
|
|
||||||
that part of it is a work based on the Library, and explaining
|
|
||||||
where to find the accompanying uncombined form of the same work.
|
|
||||||
|
|
||||||
8. You may not copy, modify, sublicense, link with, or distribute
|
|
||||||
the Library except as expressly provided under this License. Any
|
|
||||||
attempt otherwise to copy, modify, sublicense, link with, or
|
|
||||||
distribute the Library is void, and will automatically terminate your
|
|
||||||
rights under this License. However, parties who have received copies,
|
|
||||||
or rights, from you under this License will not have their licenses
|
|
||||||
terminated so long as such parties remain in full compliance.
|
|
||||||
|
|
||||||
9. You are not required to accept this License, since you have not
|
|
||||||
signed it. However, nothing else grants you permission to modify or
|
|
||||||
distribute the Library or its derivative works. These actions are
|
|
||||||
prohibited by law if you do not accept this License. Therefore, by
|
|
||||||
modifying or distributing the Library (or any work based on the
|
|
||||||
Library), you indicate your acceptance of this License to do so, and
|
|
||||||
all its terms and conditions for copying, distributing or modifying
|
|
||||||
the Library or works based on it.
|
|
||||||
|
|
||||||
10. Each time you redistribute the Library (or any work based on the
|
|
||||||
Library), the recipient automatically receives a license from the
|
|
||||||
original licensor to copy, distribute, link with or modify the Library
|
|
||||||
subject to these terms and conditions. You may not impose any further
|
|
||||||
restrictions on the recipients' exercise of the rights granted herein.
|
|
||||||
You are not responsible for enforcing compliance by third parties with
|
|
||||||
this License.
|
|
||||||
|
|
||||||
11. If, as a consequence of a court judgment or allegation of patent
|
|
||||||
infringement or for any other reason (not limited to patent issues),
|
|
||||||
conditions are imposed on you (whether by court order, agreement or
|
|
||||||
otherwise) that contradict the conditions of this License, they do not
|
|
||||||
excuse you from the conditions of this License. If you cannot
|
|
||||||
distribute so as to satisfy simultaneously your obligations under this
|
|
||||||
License and any other pertinent obligations, then as a consequence you
|
|
||||||
may not distribute the Library at all. For example, if a patent
|
|
||||||
license would not permit royalty-free redistribution of the Library by
|
|
||||||
all those who receive copies directly or indirectly through you, then
|
|
||||||
the only way you could satisfy both it and this License would be to
|
|
||||||
refrain entirely from distribution of the Library.
|
|
||||||
|
|
||||||
If any portion of this section is held invalid or unenforceable under any
|
|
||||||
particular circumstance, the balance of the section is intended to apply,
|
|
||||||
and the section as a whole is intended to apply in other circumstances.
|
|
||||||
|
|
||||||
It is not the purpose of this section to induce you to infringe any
|
|
||||||
patents or other property right claims or to contest validity of any
|
|
||||||
such claims; this section has the sole purpose of protecting the
|
|
||||||
integrity of the free software distribution system which is
|
|
||||||
implemented by public license practices. Many people have made
|
|
||||||
generous contributions to the wide range of software distributed
|
|
||||||
through that system in reliance on consistent application of that
|
|
||||||
system; it is up to the author/donor to decide if he or she is willing
|
|
||||||
to distribute software through any other system and a licensee cannot
|
|
||||||
impose that choice.
|
|
||||||
|
|
||||||
This section is intended to make thoroughly clear what is believed to
|
|
||||||
be a consequence of the rest of this License.
|
|
||||||
|
|
||||||
12. If the distribution and/or use of the Library is restricted in
|
|
||||||
certain countries either by patents or by copyrighted interfaces, the
|
|
||||||
original copyright holder who places the Library under this License may add
|
|
||||||
an explicit geographical distribution limitation excluding those countries,
|
|
||||||
so that distribution is permitted only in or among countries not thus
|
|
||||||
excluded. In such case, this License incorporates the limitation as if
|
|
||||||
written in the body of this License.
|
|
||||||
|
|
||||||
13. The Free Software Foundation may publish revised and/or new
|
|
||||||
versions of the Lesser General Public License from time to time.
|
|
||||||
Such new versions will be similar in spirit to the present version,
|
|
||||||
but may differ in detail to address new problems or concerns.
|
|
||||||
|
|
||||||
Each version is given a distinguishing version number. If the Library
|
|
||||||
specifies a version number of this License which applies to it and
|
|
||||||
"any later version", you have the option of following the terms and
|
|
||||||
conditions either of that version or of any later version published by
|
|
||||||
the Free Software Foundation. If the Library does not specify a
|
|
||||||
license version number, you may choose any version ever published by
|
|
||||||
the Free Software Foundation.
|
|
||||||
|
|
||||||
14. If you wish to incorporate parts of the Library into other free
|
|
||||||
programs whose distribution conditions are incompatible with these,
|
|
||||||
write to the author to ask for permission. For software which is
|
|
||||||
copyrighted by the Free Software Foundation, write to the Free
|
|
||||||
Software Foundation; we sometimes make exceptions for this. Our
|
|
||||||
decision will be guided by the two goals of preserving the free status
|
|
||||||
of all derivatives of our free software and of promoting the sharing
|
|
||||||
and reuse of software generally.
|
|
||||||
|
|
||||||
NO WARRANTY
|
|
||||||
|
|
||||||
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO
|
|
||||||
WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
|
|
||||||
EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
|
|
||||||
OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY
|
|
||||||
KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
||||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
|
|
||||||
LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME
|
|
||||||
THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
|
||||||
|
|
||||||
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
|
|
||||||
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY
|
|
||||||
AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU
|
|
||||||
FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
|
|
||||||
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
|
|
||||||
LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
|
|
||||||
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
|
|
||||||
FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
|
|
||||||
SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
|
|
||||||
DAMAGES.
|
|
||||||
|
|
||||||
END OF TERMS AND CONDITIONS
|
|
||||||
|
|
||||||
How to Apply These Terms to Your New Libraries
|
|
||||||
|
|
||||||
If you develop a new library, and you want it to be of the greatest
|
|
||||||
possible use to the public, we recommend making it free software that
|
|
||||||
everyone can redistribute and change. You can do so by permitting
|
|
||||||
redistribution under these terms (or, alternatively, under the terms of the
|
|
||||||
ordinary General Public License).
|
|
||||||
|
|
||||||
To apply these terms, attach the following notices to the library. It is
|
|
||||||
safest to attach them to the start of each source file to most effectively
|
|
||||||
convey the exclusion of warranty; and each file should have at least the
|
|
||||||
"copyright" line and a pointer to where the full notice is found.
|
|
||||||
|
|
||||||
<one line to give the library's name and a brief idea of what it does.>
|
|
||||||
Copyright (C) <year> <name of author>
|
|
||||||
|
|
||||||
This library is free software; you can redistribute it and/or
|
|
||||||
modify it under the terms of the GNU Lesser General Public
|
|
||||||
License as published by the Free Software Foundation; either
|
|
||||||
version 2.1 of the License, or (at your option) any later version.
|
|
||||||
|
|
||||||
This library is distributed in the hope that it will be useful,
|
|
||||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
||||||
Lesser General Public License for more details.
|
|
||||||
|
|
||||||
You should have received a copy of the GNU Lesser General Public
|
|
||||||
License along with this library; if not, write to the Free Software
|
|
||||||
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
||||||
|
|
||||||
Also add information on how to contact you by electronic and paper mail.
|
|
||||||
|
|
||||||
You should also get your employer (if you work as a programmer) or your
|
|
||||||
school, if any, to sign a "copyright disclaimer" for the library, if
|
|
||||||
necessary. Here is a sample; alter the names:
|
|
||||||
|
|
||||||
Yoyodyne, Inc., hereby disclaims all copyright interest in the
|
|
||||||
library `Frob' (a library for tweaking knobs) written by James Random Hacker.
|
|
||||||
|
|
||||||
<signature of Ty Coon>, 1 April 1990
|
|
||||||
Ty Coon, President of Vice
|
|
||||||
|
|
||||||
That's all there is to it!
|
|
|
@ -22,15 +22,13 @@
|
||||||
exploit this.
|
exploit this.
|
||||||
|
|
||||||
|
|
||||||
4. LDAP password protection
|
4. Protection of your LDAP password and directory contents
|
||||||
|
|
||||||
|
You have to install the MCrypt extension for PHP to enable encryption.
|
||||||
|
|
||||||
Your LDAP password is stored encrypted in the session file. The key and IV to decrypt
|
Your LDAP password is stored encrypted in the session file. The key and IV to decrypt
|
||||||
it are stored in two cookies. We use MCrypt/AES or Blowfish to encrypt the password.
|
it are stored in two cookies. We use MCrypt/AES to encrypt the password.
|
||||||
|
All data that was read from LDAP and needs to be stored in the session file is also
|
||||||
|
encrypted.
|
||||||
5. Protection of new user passwords
|
|
||||||
|
|
||||||
These passwords are, if stored in the session file, encrypted with the same key and IV
|
|
||||||
as your LDAP password.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -62,7 +62,6 @@ lists</a></li>
|
||||||
</li>
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
<ul>
|
<ul>
|
||||||
<li><a href="other_libs.htm#blowfish">Blowfish</a></li>
|
|
||||||
<li><a href="other_libs.htm#cache">LADP cache</a></li>
|
<li><a href="other_libs.htm#cache">LADP cache</a></li>
|
||||||
<li><a href="other_libs.htm#lists">Account lists</a></li>
|
<li><a href="other_libs.htm#lists">Account lists</a></li>
|
||||||
<li><a href="other_libs.htm#status">Status messages</a></li>
|
<li><a href="other_libs.htm#status">Status messages</a></li>
|
||||||
|
|
|
@ -37,8 +37,7 @@ encrypted before storing in session.<br>
|
||||||
encrypts a string and returns a binary object. This can be decrypted
|
encrypts a string and returns a binary object. This can be decrypted
|
||||||
with <span style="font-weight: bold; font-style: italic;">$_SESSION['ldap']->decrypt(<object>)</span><br>
|
with <span style="font-weight: bold; font-style: italic;">$_SESSION['ldap']->decrypt(<object>)</span><br>
|
||||||
<br>
|
<br>
|
||||||
Ldap.inc will take care for the crypotographic key and if Blowfish or
|
Ldap.inc will take care for the crypotographic key.<br>
|
||||||
MCrypt/AES is used.<br>
|
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
<h2>4. Random values</h2>
|
<h2>4. Random values</h2>
|
||||||
|
|
|
@ -12,11 +12,6 @@
|
||||||
<br>
|
<br>
|
||||||
<h2><a name="lamdaemon"></a>Lamdaemon (lamdaemon.pl)<br>
|
<h2><a name="lamdaemon"></a>Lamdaemon (lamdaemon.pl)<br>
|
||||||
</h2>
|
</h2>
|
||||||
<h2><a name="blowfish"></a>Blowfish (blowfish.inc)</h2>
|
|
||||||
If MCrypt is not available LAM uses the Blowfish algorithm to store
|
|
||||||
sensitive data in the session file.<br>
|
|
||||||
This file was copied from the <span style="font-style: italic;">Horde</span>
|
|
||||||
project and modified to fit LAM's needs.<br>
|
|
||||||
<br>
|
<br>
|
||||||
<h2><a name="cache"></a>LDAP cache (cache.inc)</h2>
|
<h2><a name="cache"></a>LDAP cache (cache.inc)</h2>
|
||||||
<br>
|
<br>
|
||||||
|
|
|
@ -1,548 +0,0 @@
|
||||||
<?php
|
|
||||||
|
|
||||||
/*
|
|
||||||
* The Cipher_blowfish:: class implements the Cipher interface enryption data
|
|
||||||
* using the Blowfish algorithm.
|
|
||||||
*
|
|
||||||
* This library is free software; you can redistribute it and/or
|
|
||||||
* modify it under the terms of the GNU Lesser General Public
|
|
||||||
* License as published by the Free Software Foundation; either
|
|
||||||
* version 2.1 of the License, or (at your option) any later version.
|
|
||||||
*
|
|
||||||
* This library is distributed in the hope that it will be useful,
|
|
||||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
||||||
* Lesser General Public License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU Lesser General Public
|
|
||||||
* License along with this library; if not, write to the Free Software
|
|
||||||
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
||||||
*
|
|
||||||
* Copyright 2002-2003 Mike Cochrane <mike@graftonhall.co.nz>
|
|
||||||
*
|
|
||||||
* See http://www.fsf.org/copyleft/lgpl.html for license information (LGPL).
|
|
||||||
*
|
|
||||||
* This file was copied from the Horde project (http://www.horde.org).
|
|
||||||
*
|
|
||||||
* author: Mike Cochrane <mike@graftonhall.co.nz>
|
|
||||||
*
|
|
||||||
* edited by Roland Gruber <post@rolandgruber.de> for LAM
|
|
||||||
* - added encrypt/decrypt functions
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Blowfish encryption/decryption
|
|
||||||
*
|
|
||||||
* @package LDAP
|
|
||||||
* @author Roland Gruber
|
|
||||||
* @author Mike Cochrane
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Encrypts the LDAP username and password before storing in session.
|
|
||||||
*
|
|
||||||
* @package LDAP
|
|
||||||
*/
|
|
||||||
class Cipher_blowfish {
|
|
||||||
|
|
||||||
/** Pi Array */
|
|
||||||
var $p = array(
|
|
||||||
0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344,
|
|
||||||
0xA4093822, 0x299F31D0, 0x082EFA98, 0xEC4E6C89,
|
|
||||||
0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C,
|
|
||||||
0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917,
|
|
||||||
0x9216D5D9, 0x8979FB1B);
|
|
||||||
|
|
||||||
/** S Boxes */
|
|
||||||
var $s1 = array(
|
|
||||||
0xD1310BA6, 0x98DFB5AC, 0x2FFD72DB, 0xD01ADFB7,
|
|
||||||
0xB8E1AFED, 0x6A267E96, 0xBA7C9045, 0xF12C7F99,
|
|
||||||
0x24A19947, 0xB3916CF7, 0x0801F2E2, 0x858EFC16,
|
|
||||||
0x636920D8, 0x71574E69, 0xA458FEA3, 0xF4933D7E,
|
|
||||||
0x0D95748F, 0x728EB658, 0x718BCD58, 0x82154AEE,
|
|
||||||
0x7B54A41D, 0xC25A59B5, 0x9C30D539, 0x2AF26013,
|
|
||||||
0xC5D1B023, 0x286085F0, 0xCA417918, 0xB8DB38EF,
|
|
||||||
0x8E79DCB0, 0x603A180E, 0x6C9E0E8B, 0xB01E8A3E,
|
|
||||||
0xD71577C1, 0xBD314B27, 0x78AF2FDA, 0x55605C60,
|
|
||||||
0xE65525F3, 0xAA55AB94, 0x57489862, 0x63E81440,
|
|
||||||
0x55CA396A, 0x2AAB10B6, 0xB4CC5C34, 0x1141E8CE,
|
|
||||||
0xA15486AF, 0x7C72E993, 0xB3EE1411, 0x636FBC2A,
|
|
||||||
0x2BA9C55D, 0x741831F6, 0xCE5C3E16, 0x9B87931E,
|
|
||||||
0xAFD6BA33, 0x6C24CF5C, 0x7A325381, 0x28958677,
|
|
||||||
0x3B8F4898, 0x6B4BB9AF, 0xC4BFE81B, 0x66282193,
|
|
||||||
0x61D809CC, 0xFB21A991, 0x487CAC60, 0x5DEC8032,
|
|
||||||
0xEF845D5D, 0xE98575B1, 0xDC262302, 0xEB651B88,
|
|
||||||
0x23893E81, 0xD396ACC5, 0x0F6D6FF3, 0x83F44239,
|
|
||||||
0x2E0B4482, 0xA4842004, 0x69C8F04A, 0x9E1F9B5E,
|
|
||||||
0x21C66842, 0xF6E96C9A, 0x670C9C61, 0xABD388F0,
|
|
||||||
0x6A51A0D2, 0xD8542F68, 0x960FA728, 0xAB5133A3,
|
|
||||||
0x6EEF0B6C, 0x137A3BE4, 0xBA3BF050, 0x7EFB2A98,
|
|
||||||
0xA1F1651D, 0x39AF0176, 0x66CA593E, 0x82430E88,
|
|
||||||
0x8CEE8619, 0x456F9FB4, 0x7D84A5C3, 0x3B8B5EBE,
|
|
||||||
0xE06F75D8, 0x85C12073, 0x401A449F, 0x56C16AA6,
|
|
||||||
0x4ED3AA62, 0x363F7706, 0x1BFEDF72, 0x429B023D,
|
|
||||||
0x37D0D724, 0xD00A1248, 0xDB0FEAD3, 0x49F1C09B,
|
|
||||||
0x075372C9, 0x80991B7B, 0x25D479D8, 0xF6E8DEF7,
|
|
||||||
0xE3FE501A, 0xB6794C3B, 0x976CE0BD, 0x04C006BA,
|
|
||||||
0xC1A94FB6, 0x409F60C4, 0x5E5C9EC2, 0x196A2463,
|
|
||||||
0x68FB6FAF, 0x3E6C53B5, 0x1339B2EB, 0x3B52EC6F,
|
|
||||||
0x6DFC511F, 0x9B30952C, 0xCC814544, 0xAF5EBD09,
|
|
||||||
0xBEE3D004, 0xDE334AFD, 0x660F2807, 0x192E4BB3,
|
|
||||||
0xC0CBA857, 0x45C8740F, 0xD20B5F39, 0xB9D3FBDB,
|
|
||||||
0x5579C0BD, 0x1A60320A, 0xD6A100C6, 0x402C7279,
|
|
||||||
0x679F25FE, 0xFB1FA3CC, 0x8EA5E9F8, 0xDB3222F8,
|
|
||||||
0x3C7516DF, 0xFD616B15, 0x2F501EC8, 0xAD0552AB,
|
|
||||||
0x323DB5FA, 0xFD238760, 0x53317B48, 0x3E00DF82,
|
|
||||||
0x9E5C57BB, 0xCA6F8CA0, 0x1A87562E, 0xDF1769DB,
|
|
||||||
0xD542A8F6, 0x287EFFC3, 0xAC6732C6, 0x8C4F5573,
|
|
||||||
0x695B27B0, 0xBBCA58C8, 0xE1FFA35D, 0xB8F011A0,
|
|
||||||
0x10FA3D98, 0xFD2183B8, 0x4AFCB56C, 0x2DD1D35B,
|
|
||||||
0x9A53E479, 0xB6F84565, 0xD28E49BC, 0x4BFB9790,
|
|
||||||
0xE1DDF2DA, 0xA4CB7E33, 0x62FB1341, 0xCEE4C6E8,
|
|
||||||
0xEF20CADA, 0x36774C01, 0xD07E9EFE, 0x2BF11FB4,
|
|
||||||
0x95DBDA4D, 0xAE909198, 0xEAAD8E71, 0x6B93D5A0,
|
|
||||||
0xD08ED1D0, 0xAFC725E0, 0x8E3C5B2F, 0x8E7594B7,
|
|
||||||
0x8FF6E2FB, 0xF2122B64, 0x8888B812, 0x900DF01C,
|
|
||||||
0x4FAD5EA0, 0x688FC31C, 0xD1CFF191, 0xB3A8C1AD,
|
|
||||||
0x2F2F2218, 0xBE0E1777, 0xEA752DFE, 0x8B021FA1,
|
|
||||||
0xE5A0CC0F, 0xB56F74E8, 0x18ACF3D6, 0xCE89E299,
|
|
||||||
0xB4A84FE0, 0xFD13E0B7, 0x7CC43B81, 0xD2ADA8D9,
|
|
||||||
0x165FA266, 0x80957705, 0x93CC7314, 0x211A1477,
|
|
||||||
0xE6AD2065, 0x77B5FA86, 0xC75442F5, 0xFB9D35CF,
|
|
||||||
0xEBCDAF0C, 0x7B3E89A0, 0xD6411BD3, 0xAE1E7E49,
|
|
||||||
0x00250E2D, 0x2071B35E, 0x226800BB, 0x57B8E0AF,
|
|
||||||
0x2464369B, 0xF009B91E, 0x5563911D, 0x59DFA6AA,
|
|
||||||
0x78C14389, 0xD95A537F, 0x207D5BA2, 0x02E5B9C5,
|
|
||||||
0x83260376, 0x6295CFA9, 0x11C81968, 0x4E734A41,
|
|
||||||
0xB3472DCA, 0x7B14A94A, 0x1B510052, 0x9A532915,
|
|
||||||
0xD60F573F, 0xBC9BC6E4, 0x2B60A476, 0x81E67400,
|
|
||||||
0x08BA6FB5, 0x571BE91F, 0xF296EC6B, 0x2A0DD915,
|
|
||||||
0xB6636521, 0xE7B9F9B6, 0xFF34052E, 0xC5855664,
|
|
||||||
0x53B02D5D, 0xA99F8FA1, 0x08BA4799, 0x6E85076A);
|
|
||||||
/** S Boxes */
|
|
||||||
var $s2 = array(
|
|
||||||
0x4B7A70E9, 0xB5B32944, 0xDB75092E, 0xC4192623,
|
|
||||||
0xAD6EA6B0, 0x49A7DF7D, 0x9CEE60B8, 0x8FEDB266,
|
|
||||||
0xECAA8C71, 0x699A17FF, 0x5664526C, 0xC2B19EE1,
|
|
||||||
0x193602A5, 0x75094C29, 0xA0591340, 0xE4183A3E,
|
|
||||||
0x3F54989A, 0x5B429D65, 0x6B8FE4D6, 0x99F73FD6,
|
|
||||||
0xA1D29C07, 0xEFE830F5, 0x4D2D38E6, 0xF0255DC1,
|
|
||||||
0x4CDD2086, 0x8470EB26, 0x6382E9C6, 0x021ECC5E,
|
|
||||||
0x09686B3F, 0x3EBAEFC9, 0x3C971814, 0x6B6A70A1,
|
|
||||||
0x687F3584, 0x52A0E286, 0xB79C5305, 0xAA500737,
|
|
||||||
0x3E07841C, 0x7FDEAE5C, 0x8E7D44EC, 0x5716F2B8,
|
|
||||||
0xB03ADA37, 0xF0500C0D, 0xF01C1F04, 0x0200B3FF,
|
|
||||||
0xAE0CF51A, 0x3CB574B2, 0x25837A58, 0xDC0921BD,
|
|
||||||
0xD19113F9, 0x7CA92FF6, 0x94324773, 0x22F54701,
|
|
||||||
0x3AE5E581, 0x37C2DADC, 0xC8B57634, 0x9AF3DDA7,
|
|
||||||
0xA9446146, 0x0FD0030E, 0xECC8C73E, 0xA4751E41,
|
|
||||||
0xE238CD99, 0x3BEA0E2F, 0x3280BBA1, 0x183EB331,
|
|
||||||
0x4E548B38, 0x4F6DB908, 0x6F420D03, 0xF60A04BF,
|
|
||||||
0x2CB81290, 0x24977C79, 0x5679B072, 0xBCAF89AF,
|
|
||||||
0xDE9A771F, 0xD9930810, 0xB38BAE12, 0xDCCF3F2E,
|
|
||||||
0x5512721F, 0x2E6B7124, 0x501ADDE6, 0x9F84CD87,
|
|
||||||
0x7A584718, 0x7408DA17, 0xBC9F9ABC, 0xE94B7D8C,
|
|
||||||
0xEC7AEC3A, 0xDB851DFA, 0x63094366, 0xC464C3D2,
|
|
||||||
0xEF1C1847, 0x3215D908, 0xDD433B37, 0x24C2BA16,
|
|
||||||
0x12A14D43, 0x2A65C451, 0x50940002, 0x133AE4DD,
|
|
||||||
0x71DFF89E, 0x10314E55, 0x81AC77D6, 0x5F11199B,
|
|
||||||
0x043556F1, 0xD7A3C76B, 0x3C11183B, 0x5924A509,
|
|
||||||
0xF28FE6ED, 0x97F1FBFA, 0x9EBABF2C, 0x1E153C6E,
|
|
||||||
0x86E34570, 0xEAE96FB1, 0x860E5E0A, 0x5A3E2AB3,
|
|
||||||
0x771FE71C, 0x4E3D06FA, 0x2965DCB9, 0x99E71D0F,
|
|
||||||
0x803E89D6, 0x5266C825, 0x2E4CC978, 0x9C10B36A,
|
|
||||||
0xC6150EBA, 0x94E2EA78, 0xA5FC3C53, 0x1E0A2DF4,
|
|
||||||
0xF2F74EA7, 0x361D2B3D, 0x1939260F, 0x19C27960,
|
|
||||||
0x5223A708, 0xF71312B6, 0xEBADFE6E, 0xEAC31F66,
|
|
||||||
0xE3BC4595, 0xA67BC883, 0xB17F37D1, 0x018CFF28,
|
|
||||||
0xC332DDEF, 0xBE6C5AA5, 0x65582185, 0x68AB9802,
|
|
||||||
0xEECEA50F, 0xDB2F953B, 0x2AEF7DAD, 0x5B6E2F84,
|
|
||||||
0x1521B628, 0x29076170, 0xECDD4775, 0x619F1510,
|
|
||||||
0x13CCA830, 0xEB61BD96, 0x0334FE1E, 0xAA0363CF,
|
|
||||||
0xB5735C90, 0x4C70A239, 0xD59E9E0B, 0xCBAADE14,
|
|
||||||
0xEECC86BC, 0x60622CA7, 0x9CAB5CAB, 0xB2F3846E,
|
|
||||||
0x648B1EAF, 0x19BDF0CA, 0xA02369B9, 0x655ABB50,
|
|
||||||
0x40685A32, 0x3C2AB4B3, 0x319EE9D5, 0xC021B8F7,
|
|
||||||
0x9B540B19, 0x875FA099, 0x95F7997E, 0x623D7DA8,
|
|
||||||
0xF837889A, 0x97E32D77, 0x11ED935F, 0x16681281,
|
|
||||||
0x0E358829, 0xC7E61FD6, 0x96DEDFA1, 0x7858BA99,
|
|
||||||
0x57F584A5, 0x1B227263, 0x9B83C3FF, 0x1AC24696,
|
|
||||||
0xCDB30AEB, 0x532E3054, 0x8FD948E4, 0x6DBC3128,
|
|
||||||
0x58EBF2EF, 0x34C6FFEA, 0xFE28ED61, 0xEE7C3C73,
|
|
||||||
0x5D4A14D9, 0xE864B7E3, 0x42105D14, 0x203E13E0,
|
|
||||||
0x45EEE2B6, 0xA3AAABEA, 0xDB6C4F15, 0xFACB4FD0,
|
|
||||||
0xC742F442, 0xEF6ABBB5, 0x654F3B1D, 0x41CD2105,
|
|
||||||
0xD81E799E, 0x86854DC7, 0xE44B476A, 0x3D816250,
|
|
||||||
0xCF62A1F2, 0x5B8D2646, 0xFC8883A0, 0xC1C7B6A3,
|
|
||||||
0x7F1524C3, 0x69CB7492, 0x47848A0B, 0x5692B285,
|
|
||||||
0x095BBF00, 0xAD19489D, 0x1462B174, 0x23820E00,
|
|
||||||
0x58428D2A, 0x0C55F5EA, 0x1DADF43E, 0x233F7061,
|
|
||||||
0x3372F092, 0x8D937E41, 0xD65FECF1, 0x6C223BDB,
|
|
||||||
0x7CDE3759, 0xCBEE7460, 0x4085F2A7, 0xCE77326E,
|
|
||||||
0xA6078084, 0x19F8509E, 0xE8EFD855, 0x61D99735,
|
|
||||||
0xA969A7AA, 0xC50C06C2, 0x5A04ABFC, 0x800BCADC,
|
|
||||||
0x9E447A2E, 0xC3453484, 0xFDD56705, 0x0E1E9EC9,
|
|
||||||
0xDB73DBD3, 0x105588CD, 0x675FDA79, 0xE3674340,
|
|
||||||
0xC5C43465, 0x713E38D8, 0x3D28F89E, 0xF16DFF20,
|
|
||||||
0x153E21E7, 0x8FB03D4A, 0xE6E39F2B, 0xDB83ADF7);
|
|
||||||
/** S Boxes */
|
|
||||||
var $s3 = array(
|
|
||||||
0xE93D5A68, 0x948140F7, 0xF64C261C, 0x94692934,
|
|
||||||
0x411520F7, 0x7602D4F7, 0xBCF46B2E, 0xD4A20068,
|
|
||||||
0xD4082471, 0x3320F46A, 0x43B7D4B7, 0x500061AF,
|
|
||||||
0x1E39F62E, 0x97244546, 0x14214F74, 0xBF8B8840,
|
|
||||||
0x4D95FC1D, 0x96B591AF, 0x70F4DDD3, 0x66A02F45,
|
|
||||||
0xBFBC09EC, 0x03BD9785, 0x7FAC6DD0, 0x31CB8504,
|
|
||||||
0x96EB27B3, 0x55FD3941, 0xDA2547E6, 0xABCA0A9A,
|
|
||||||
0x28507825, 0x530429F4, 0x0A2C86DA, 0xE9B66DFB,
|
|
||||||
0x68DC1462, 0xD7486900, 0x680EC0A4, 0x27A18DEE,
|
|
||||||
0x4F3FFEA2, 0xE887AD8C, 0xB58CE006, 0x7AF4D6B6,
|
|
||||||
0xAACE1E7C, 0xD3375FEC, 0xCE78A399, 0x406B2A42,
|
|
||||||
0x20FE9E35, 0xD9F385B9, 0xEE39D7AB, 0x3B124E8B,
|
|
||||||
0x1DC9FAF7, 0x4B6D1856, 0x26A36631, 0xEAE397B2,
|
|
||||||
0x3A6EFA74, 0xDD5B4332, 0x6841E7F7, 0xCA7820FB,
|
|
||||||
0xFB0AF54E, 0xD8FEB397, 0x454056AC, 0xBA489527,
|
|
||||||
0x55533A3A, 0x20838D87, 0xFE6BA9B7, 0xD096954B,
|
|
||||||
0x55A867BC, 0xA1159A58, 0xCCA92963, 0x99E1DB33,
|
|
||||||
0xA62A4A56, 0x3F3125F9, 0x5EF47E1C, 0x9029317C,
|
|
||||||
0xFDF8E802, 0x04272F70, 0x80BB155C, 0x05282CE3,
|
|
||||||
0x95C11548, 0xE4C66D22, 0x48C1133F, 0xC70F86DC,
|
|
||||||
0x07F9C9EE, 0x41041F0F, 0x404779A4, 0x5D886E17,
|
|
||||||
0x325F51EB, 0xD59BC0D1, 0xF2BCC18F, 0x41113564,
|
|
||||||
0x257B7834, 0x602A9C60, 0xDFF8E8A3, 0x1F636C1B,
|
|
||||||
0x0E12B4C2, 0x02E1329E, 0xAF664FD1, 0xCAD18115,
|
|
||||||
0x6B2395E0, 0x333E92E1, 0x3B240B62, 0xEEBEB922,
|
|
||||||
0x85B2A20E, 0xE6BA0D99, 0xDE720C8C, 0x2DA2F728,
|
|
||||||
0xD0127845, 0x95B794FD, 0x647D0862, 0xE7CCF5F0,
|
|
||||||
0x5449A36F, 0x877D48FA, 0xC39DFD27, 0xF33E8D1E,
|
|
||||||
0x0A476341, 0x992EFF74, 0x3A6F6EAB, 0xF4F8FD37,
|
|
||||||
0xA812DC60, 0xA1EBDDF8, 0x991BE14C, 0xDB6E6B0D,
|
|
||||||
0xC67B5510, 0x6D672C37, 0x2765D43B, 0xDCD0E804,
|
|
||||||
0xF1290DC7, 0xCC00FFA3, 0xB5390F92, 0x690FED0B,
|
|
||||||
0x667B9FFB, 0xCEDB7D9C, 0xA091CF0B, 0xD9155EA3,
|
|
||||||
0xBB132F88, 0x515BAD24, 0x7B9479BF, 0x763BD6EB,
|
|
||||||
0x37392EB3, 0xCC115979, 0x8026E297, 0xF42E312D,
|
|
||||||
0x6842ADA7, 0xC66A2B3B, 0x12754CCC, 0x782EF11C,
|
|
||||||
0x6A124237, 0xB79251E7, 0x06A1BBE6, 0x4BFB6350,
|
|
||||||
0x1A6B1018, 0x11CAEDFA, 0x3D25BDD8, 0xE2E1C3C9,
|
|
||||||
0x44421659, 0x0A121386, 0xD90CEC6E, 0xD5ABEA2A,
|
|
||||||
0x64AF674E, 0xDA86A85F, 0xBEBFE988, 0x64E4C3FE,
|
|
||||||
0x9DBC8057, 0xF0F7C086, 0x60787BF8, 0x6003604D,
|
|
||||||
0xD1FD8346, 0xF6381FB0, 0x7745AE04, 0xD736FCCC,
|
|
||||||
0x83426B33, 0xF01EAB71, 0xB0804187, 0x3C005E5F,
|
|
||||||
0x77A057BE, 0xBDE8AE24, 0x55464299, 0xBF582E61,
|
|
||||||
0x4E58F48F, 0xF2DDFDA2, 0xF474EF38, 0x8789BDC2,
|
|
||||||
0x5366F9C3, 0xC8B38E74, 0xB475F255, 0x46FCD9B9,
|
|
||||||
0x7AEB2661, 0x8B1DDF84, 0x846A0E79, 0x915F95E2,
|
|
||||||
0x466E598E, 0x20B45770, 0x8CD55591, 0xC902DE4C,
|
|
||||||
0xB90BACE1, 0xBB8205D0, 0x11A86248, 0x7574A99E,
|
|
||||||
0xB77F19B6, 0xE0A9DC09, 0x662D09A1, 0xC4324633,
|
|
||||||
0xE85A1F02, 0x09F0BE8C, 0x4A99A025, 0x1D6EFE10,
|
|
||||||
0x1AB93D1D, 0x0BA5A4DF, 0xA186F20F, 0x2868F169,
|
|
||||||
0xDCB7DA83, 0x573906FE, 0xA1E2CE9B, 0x4FCD7F52,
|
|
||||||
0x50115E01, 0xA70683FA, 0xA002B5C4, 0x0DE6D027,
|
|
||||||
0x9AF88C27, 0x773F8641, 0xC3604C06, 0x61A806B5,
|
|
||||||
0xF0177A28, 0xC0F586E0, 0x006058AA, 0x30DC7D62,
|
|
||||||
0x11E69ED7, 0x2338EA63, 0x53C2DD94, 0xC2C21634,
|
|
||||||
0xBBCBEE56, 0x90BCB6DE, 0xEBFC7DA1, 0xCE591D76,
|
|
||||||
0x6F05E409, 0x4B7C0188, 0x39720A3D, 0x7C927C24,
|
|
||||||
0x86E3725F, 0x724D9DB9, 0x1AC15BB4, 0xD39EB8FC,
|
|
||||||
0xED545578, 0x08FCA5B5, 0xD83D7CD3, 0x4DAD0FC4,
|
|
||||||
0x1E50EF5E, 0xB161E6F8, 0xA28514D9, 0x6C51133C,
|
|
||||||
0x6FD5C7E7, 0x56E14EC4, 0x362ABFCE, 0xDDC6C837,
|
|
||||||
0xD79A3234, 0x92638212, 0x670EFA8E, 0x406000E0);
|
|
||||||
/** S Boxes */
|
|
||||||
var $s4 = array(
|
|
||||||
0x3A39CE37, 0xD3FAF5CF, 0xABC27737, 0x5AC52D1B,
|
|
||||||
0x5CB0679E, 0x4FA33742, 0xD3822740, 0x99BC9BBE,
|
|
||||||
0xD5118E9D, 0xBF0F7315, 0xD62D1C7E, 0xC700C47B,
|
|
||||||
0xB78C1B6B, 0x21A19045, 0xB26EB1BE, 0x6A366EB4,
|
|
||||||
0x5748AB2F, 0xBC946E79, 0xC6A376D2, 0x6549C2C8,
|
|
||||||
0x530FF8EE, 0x468DDE7D, 0xD5730A1D, 0x4CD04DC6,
|
|
||||||
0x2939BBDB, 0xA9BA4650, 0xAC9526E8, 0xBE5EE304,
|
|
||||||
0xA1FAD5F0, 0x6A2D519A, 0x63EF8CE2, 0x9A86EE22,
|
|
||||||
0xC089C2B8, 0x43242EF6, 0xA51E03AA, 0x9CF2D0A4,
|
|
||||||
0x83C061BA, 0x9BE96A4D, 0x8FE51550, 0xBA645BD6,
|
|
||||||
0x2826A2F9, 0xA73A3AE1, 0x4BA99586, 0xEF5562E9,
|
|
||||||
0xC72FEFD3, 0xF752F7DA, 0x3F046F69, 0x77FA0A59,
|
|
||||||
0x80E4A915, 0x87B08601, 0x9B09E6AD, 0x3B3EE593,
|
|
||||||
0xE990FD5A, 0x9E34D797, 0x2CF0B7D9, 0x022B8B51,
|
|
||||||
0x96D5AC3A, 0x017DA67D, 0xD1CF3ED6, 0x7C7D2D28,
|
|
||||||
0x1F9F25CF, 0xADF2B89B, 0x5AD6B472, 0x5A88F54C,
|
|
||||||
0xE029AC71, 0xE019A5E6, 0x47B0ACFD, 0xED93FA9B,
|
|
||||||
0xE8D3C48D, 0x283B57CC, 0xF8D56629, 0x79132E28,
|
|
||||||
0x785F0191, 0xED756055, 0xF7960E44, 0xE3D35E8C,
|
|
||||||
0x15056DD4, 0x88F46DBA, 0x03A16125, 0x0564F0BD,
|
|
||||||
0xC3EB9E15, 0x3C9057A2, 0x97271AEC, 0xA93A072A,
|
|
||||||
0x1B3F6D9B, 0x1E6321F5, 0xF59C66FB, 0x26DCF319,
|
|
||||||
0x7533D928, 0xB155FDF5, 0x03563482, 0x8ABA3CBB,
|
|
||||||
0x28517711, 0xC20AD9F8, 0xABCC5167, 0xCCAD925F,
|
|
||||||
0x4DE81751, 0x3830DC8E, 0x379D5862, 0x9320F991,
|
|
||||||
0xEA7A90C2, 0xFB3E7BCE, 0x5121CE64, 0x774FBE32,
|
|
||||||
0xA8B6E37E, 0xC3293D46, 0x48DE5369, 0x6413E680,
|
|
||||||
0xA2AE0810, 0xDD6DB224, 0x69852DFD, 0x09072166,
|
|
||||||
0xB39A460A, 0x6445C0DD, 0x586CDECF, 0x1C20C8AE,
|
|
||||||
0x5BBEF7DD, 0x1B588D40, 0xCCD2017F, 0x6BB4E3BB,
|
|
||||||
0xDDA26A7E, 0x3A59FF45, 0x3E350A44, 0xBCB4CDD5,
|
|
||||||
0x72EACEA8, 0xFA6484BB, 0x8D6612AE, 0xBF3C6F47,
|
|
||||||
0xD29BE463, 0x542F5D9E, 0xAEC2771B, 0xF64E6370,
|
|
||||||
0x740E0D8D, 0xE75B1357, 0xF8721671, 0xAF537D5D,
|
|
||||||
0x4040CB08, 0x4EB4E2CC, 0x34D2466A, 0x0115AF84,
|
|
||||||
0xE1B00428, 0x95983A1D, 0x06B89FB4, 0xCE6EA048,
|
|
||||||
0x6F3F3B82, 0x3520AB82, 0x011A1D4B, 0x277227F8,
|
|
||||||
0x611560B1, 0xE7933FDC, 0xBB3A792B, 0x344525BD,
|
|
||||||
0xA08839E1, 0x51CE794B, 0x2F32C9B7, 0xA01FBAC9,
|
|
||||||
0xE01CC87E, 0xBCC7D1F6, 0xCF0111C3, 0xA1E8AAC7,
|
|
||||||
0x1A908749, 0xD44FBD9A, 0xD0DADECB, 0xD50ADA38,
|
|
||||||
0x0339C32A, 0xC6913667, 0x8DF9317C, 0xE0B12B4F,
|
|
||||||
0xF79E59B7, 0x43F5BB3A, 0xF2D519FF, 0x27D9459C,
|
|
||||||
0xBF97222C, 0x15E6FC2A, 0x0F91FC71, 0x9B941525,
|
|
||||||
0xFAE59361, 0xCEB69CEB, 0xC2A86459, 0x12BAA8D1,
|
|
||||||
0xB6C1075E, 0xE3056A0C, 0x10D25065, 0xCB03A442,
|
|
||||||
0xE0EC6E0E, 0x1698DB3B, 0x4C98A0BE, 0x3278E964,
|
|
||||||
0x9F1F9532, 0xE0D392DF, 0xD3A0342B, 0x8971F21E,
|
|
||||||
0x1B0A7441, 0x4BA3348C, 0xC5BE7120, 0xC37632D8,
|
|
||||||
0xDF359F8D, 0x9B992F2E, 0xE60B6F47, 0x0FE3F11D,
|
|
||||||
0xE54CDA54, 0x1EDAD891, 0xCE6279CF, 0xCD3E7E6F,
|
|
||||||
0x1618B166, 0xFD2C1D05, 0x848FD2C5, 0xF6FB2299,
|
|
||||||
0xF523F357, 0xA6327623, 0x93A83531, 0x56CCCD02,
|
|
||||||
0xACF08162, 0x5A75EBB5, 0x6E163697, 0x88D273CC,
|
|
||||||
0xDE966292, 0x81B949D0, 0x4C50901B, 0x71C65614,
|
|
||||||
0xE6C6C7BD, 0x327A140A, 0x45E1D006, 0xC3F27B9A,
|
|
||||||
0xC9AA53FD, 0x62A80F00, 0xBB25BFE2, 0x35BDD2F6,
|
|
||||||
0x71126905, 0xB2040222, 0xB6CBCF7C, 0xCD769C2B,
|
|
||||||
0x53113EC0, 0x1640E3D3, 0x38ABBD60, 0x2547ADF0,
|
|
||||||
0xBA38209C, 0xF746CE76, 0x77AFA1C5, 0x20756060,
|
|
||||||
0x85CBFE4E, 0x8AE88DD8, 0x7AAAF9B0, 0x4CF9AA7E,
|
|
||||||
0x1948C25C, 0x02FB8A8C, 0x01C36AE4, 0xD6EBE1F9,
|
|
||||||
0x90D4F869, 0xA65CDEA0, 0x3F09252D, 0xC208E69F,
|
|
||||||
0xB74E6132, 0xCE77E25B, 0x578FDFE3, 0x3AC372E6);
|
|
||||||
|
|
||||||
/** The number of rounds to do */
|
|
||||||
var $_rounds = 16;
|
|
||||||
|
|
||||||
/** Constructor */
|
|
||||||
function Cipher_blowfish()
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set the key to be used for en/decryption
|
|
||||||
*
|
|
||||||
* @param String $key The key to use
|
|
||||||
*/
|
|
||||||
function setKey($key)
|
|
||||||
{
|
|
||||||
$key = $this->_formatKey($key);
|
|
||||||
$keyPos = $keyXor = 0;
|
|
||||||
|
|
||||||
$iMax = count($this->p);
|
|
||||||
$keyLen = count($key);
|
|
||||||
for ($i = 0; $i < $iMax; $i++) {
|
|
||||||
for ($t = 0; $t < 4; $t++) {
|
|
||||||
$keyXor = ($keyXor << 8) | (($key[$keyPos]) & 0x0ff);
|
|
||||||
if (++$keyPos == $keyLen) {
|
|
||||||
$keyPos = 0;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
$this->p[$i] = $this->p[$i] ^ $keyXor;
|
|
||||||
}
|
|
||||||
|
|
||||||
$encZero = array('L' => 0, 'R' => 0);
|
|
||||||
for ($i = 0; $i + 1 < $iMax; $i += 2) {
|
|
||||||
$encZero = $this->_encryptBlock($encZero['L'], $encZero['R']);
|
|
||||||
$this->p[$i] = $encZero['L'];
|
|
||||||
$this->p[$i + 1] = $encZero['R'];
|
|
||||||
}
|
|
||||||
|
|
||||||
$iMax = count($this->s1);
|
|
||||||
for ($i = 0; $i < $iMax; $i += 2) {
|
|
||||||
$encZero = $this->_encryptBlock($encZero['L'], $encZero['R']);
|
|
||||||
$this->s1[$i] = $encZero['L'];
|
|
||||||
$this->s1[$i + 1] = $encZero['R'];
|
|
||||||
}
|
|
||||||
|
|
||||||
$iMax = count($this->s2);
|
|
||||||
for ($i = 0; $i < $iMax; $i += 2) {
|
|
||||||
$encZero = $this->_encryptBlock($encZero['L'], $encZero['R']);
|
|
||||||
$this->s2[$i] = $encZero['L'];
|
|
||||||
$this->s2[$i + 1] = $encZero['R'];
|
|
||||||
}
|
|
||||||
|
|
||||||
$iMax = count($this->s3);
|
|
||||||
for ($i = 0; $i < $iMax; $i += 2) {
|
|
||||||
$encZero = $this->_encryptBlock($encZero['L'], $encZero['R']);
|
|
||||||
$this->s3[$i] = $encZero['L'];
|
|
||||||
$this->s3[$i + 1] = $encZero['R'];
|
|
||||||
}
|
|
||||||
|
|
||||||
$iMax = count($this->s4);
|
|
||||||
for ($i = 0; $i < $iMax; $i += 2) {
|
|
||||||
$encZero = $this->_encryptBlock($encZero['L'], $encZero['R']);
|
|
||||||
$this->s4[$i] = $encZero['L'];
|
|
||||||
$this->s4[$i + 1] = $encZero['R'];
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return the size of the blocks that this cipher needs
|
|
||||||
*
|
|
||||||
* @return Integer The number of characters per block
|
|
||||||
*/
|
|
||||||
function getBlockSize()
|
|
||||||
{
|
|
||||||
return 8;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Encrypt a block on data.
|
|
||||||
*
|
|
||||||
* @param String $block The data to encrypt
|
|
||||||
* @param optional String $key The key to use
|
|
||||||
*
|
|
||||||
* @return String the encrypted output
|
|
||||||
*/
|
|
||||||
function encryptBlock($block, $key = null)
|
|
||||||
{
|
|
||||||
if (!is_null($key)) {
|
|
||||||
$this->setKey($key);
|
|
||||||
}
|
|
||||||
|
|
||||||
list($L, $R) = array_values(unpack('N*', $block));
|
|
||||||
$parts = $this->_encryptBlock($L, $R);
|
|
||||||
return pack("NN", $parts['L'], $parts['R']);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Encrypt a string of data.
|
|
||||||
*
|
|
||||||
* @param String $data The string to encrypt
|
|
||||||
* @param optional String $key The key to use
|
|
||||||
*
|
|
||||||
* @return String the encrypted output
|
|
||||||
*/
|
|
||||||
function encrypt($data, $key = null) {
|
|
||||||
// add end marker
|
|
||||||
$data .= 'x';
|
|
||||||
// split data to array of encryptable blocks
|
|
||||||
$data_blocks = array();
|
|
||||||
for ($j = 0; $j < strlen($data); $j = $j + 8) {
|
|
||||||
$data_blocks[] = substr($data, $j, 8);
|
|
||||||
}
|
|
||||||
// add spaces to last block if needed
|
|
||||||
$data_blocks[sizeof($data_blocks) - 1] = str_pad($data_blocks[sizeof($data_blocks) - 1], 8);
|
|
||||||
// encrypt blocks
|
|
||||||
$crypt_blocks = array();
|
|
||||||
for ($i = 0; $i < sizeof($data_blocks); $i++) {
|
|
||||||
$crypt_blocks[] = $this->encryptBlock($data_blocks[$i], $key);
|
|
||||||
}
|
|
||||||
return implode("", $crypt_blocks);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Encrypt a block on data.
|
|
||||||
*
|
|
||||||
* @param String $L The data to encrypt.
|
|
||||||
* @param String $R The data to encrypt.
|
|
||||||
*
|
|
||||||
* @return String The encrypted output.
|
|
||||||
*/
|
|
||||||
function _encryptBlock($L, $R)
|
|
||||||
{
|
|
||||||
$L ^= $this->p[0];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[1];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[2];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[3];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[4];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[5];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[6];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[7];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[8];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[9];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[10];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[11];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[12];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[13];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[14];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[15];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[16];
|
|
||||||
$R ^= $this->p[17];
|
|
||||||
|
|
||||||
return array('L' => $R, 'R' => $L);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Decrypt a string of data.
|
|
||||||
*
|
|
||||||
* @param String $data The data to decrypt
|
|
||||||
* @param optional String $key The key to use
|
|
||||||
*
|
|
||||||
* @return String the decrypted output
|
|
||||||
*/
|
|
||||||
function decrypt($data, $key = null){
|
|
||||||
// decrypt string parts
|
|
||||||
$decr_blocks = array();
|
|
||||||
for ($i = 0; $i < (strlen($data) / 8); $i++) {
|
|
||||||
$decr_blocks[] = $this->decryptBlock(substr($data, $i * 8, 8), $key);
|
|
||||||
}
|
|
||||||
$decr_text = "";
|
|
||||||
$decr_text = implode("", $decr_blocks);
|
|
||||||
// removed whitespaces and end marker
|
|
||||||
$decr_text = chop($decr_text);
|
|
||||||
$decr_text = substr($decr_text, 0, (strlen($decr_text) - 1));
|
|
||||||
return $decr_text;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Decrypt a block on data.
|
|
||||||
*
|
|
||||||
* @param String $block The data to decrypt
|
|
||||||
* @param optional String $key The key to use
|
|
||||||
*
|
|
||||||
* @return String the decrypted output
|
|
||||||
*/
|
|
||||||
function decryptBlock($block, $key = null)
|
|
||||||
{
|
|
||||||
if (!is_null($key)) {
|
|
||||||
$this->setKey($key);
|
|
||||||
}
|
|
||||||
|
|
||||||
list($L, $R) = array_values(unpack('N*', $block));
|
|
||||||
|
|
||||||
$L ^= $this->p[17];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[16];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[15];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[14];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[13];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[12];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[11];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[10];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[9];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[8];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[7];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[6];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[5];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[4];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[3];
|
|
||||||
$R ^= ((($this->s1[($L >> 24) & 0xFF] + $this->s2[($L >> 16) & 0x0ff]) ^ $this->s3[($L >> 8) & 0x0ff]) + $this->s4[$L & 0x0ff]) ^ $this->p[2];
|
|
||||||
$L ^= ((($this->s1[($R >> 24) & 0xFF] + $this->s2[($R >> 16) & 0x0ff]) ^ $this->s3[($R >> 8) & 0x0ff]) + $this->s4[$R & 0x0ff]) ^ $this->p[1];
|
|
||||||
|
|
||||||
$decrypted = pack("NN", $R ^ $this->p[0], $L);
|
|
||||||
return $decrypted;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Converts a text key into an array.
|
|
||||||
*
|
|
||||||
* @param String $key key string
|
|
||||||
* @return array The key.
|
|
||||||
*/
|
|
||||||
function _formatKey($key)
|
|
||||||
{
|
|
||||||
return array_values(unpack('C*', $key));
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
?>
|
|
|
@ -30,8 +30,6 @@ $Id$
|
||||||
|
|
||||||
/** Access to configuration data */
|
/** Access to configuration data */
|
||||||
include_once("config.inc");
|
include_once("config.inc");
|
||||||
/** Encryption functions */
|
|
||||||
include_once("blowfish.inc");
|
|
||||||
/** LDAP schema */
|
/** LDAP schema */
|
||||||
include_once("schema.inc");
|
include_once("schema.inc");
|
||||||
|
|
||||||
|
@ -350,15 +348,9 @@ class Ldap{
|
||||||
// encrypt string
|
// encrypt string
|
||||||
return mcrypt_encrypt(MCRYPT_RIJNDAEL_256, $key, $data, MCRYPT_MODE_ECB, $iv);
|
return mcrypt_encrypt(MCRYPT_RIJNDAEL_256, $key, $data, MCRYPT_MODE_ECB, $iv);
|
||||||
}
|
}
|
||||||
// use Blowfish if MCrypt is not available
|
// otherwise do not encrypt
|
||||||
else {
|
else {
|
||||||
// read key and iv from cookie
|
return $data;
|
||||||
$iv = base64_decode($_COOKIE["IV"]);
|
|
||||||
$key = base64_decode($_COOKIE["Key"]);
|
|
||||||
$b_key = $iv . $key;
|
|
||||||
// encrypt string
|
|
||||||
$b_fish = new Cipher_blowfish();
|
|
||||||
return $b_fish->encrypt($data, $b_key);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -379,15 +371,9 @@ class Ldap{
|
||||||
$ret = str_replace(chr(00), "", $ret);
|
$ret = str_replace(chr(00), "", $ret);
|
||||||
return $ret;
|
return $ret;
|
||||||
}
|
}
|
||||||
// use Blowfish if MCrypt is not available
|
// otherwise do not decrypt
|
||||||
else {
|
else {
|
||||||
// read key and iv from cookie
|
return $data;
|
||||||
$iv = base64_decode($_COOKIE["IV"]);
|
|
||||||
$key = base64_decode($_COOKIE["Key"]);
|
|
||||||
$b_key = $iv . $key;
|
|
||||||
// decrypt string
|
|
||||||
$b_fish = new Cipher_blowfish();
|
|
||||||
return $b_fish->decrypt($data, $b_key);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -56,19 +56,10 @@ function display_LoginPage($config_object) {
|
||||||
srand((double)microtime()*1234567);
|
srand((double)microtime()*1234567);
|
||||||
$iv = mcrypt_create_iv(32, MCRYPT_RAND);
|
$iv = mcrypt_create_iv(32, MCRYPT_RAND);
|
||||||
}
|
}
|
||||||
|
// save both in cookie
|
||||||
|
setcookie("Key", base64_encode($key), 0, "/");
|
||||||
|
setcookie("IV", base64_encode($iv), 0, "/");
|
||||||
}
|
}
|
||||||
// use Blowfish if MCrypt is not available
|
|
||||||
else {
|
|
||||||
// generate iv and key for encryption
|
|
||||||
$key = "";
|
|
||||||
$iv = "";
|
|
||||||
while (strlen($key) < 30) $key .= mt_rand();
|
|
||||||
while (strlen($iv) < 30) $iv .= mt_rand();
|
|
||||||
}
|
|
||||||
|
|
||||||
// save both in cookie
|
|
||||||
setcookie("Key", base64_encode($key), 0, "/");
|
|
||||||
setcookie("IV", base64_encode($iv), 0, "/");
|
|
||||||
|
|
||||||
$_SESSION['language'] = $config_object->get_defaultLanguage();
|
$_SESSION['language'] = $config_object->get_defaultLanguage();
|
||||||
|
|
||||||
|
|
|
@ -30,8 +30,10 @@ $Id$
|
||||||
|
|
||||||
|
|
||||||
// delete key and iv in cookie
|
// delete key and iv in cookie
|
||||||
setcookie("Key", "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", 0, "/");
|
if (function_exists('mcrypt_create_iv')) {
|
||||||
setcookie("IV", "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", 0, "/");
|
setcookie("Key", "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", 0, "/");
|
||||||
|
setcookie("IV", "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", 0, "/");
|
||||||
|
}
|
||||||
|
|
||||||
/** Used to display status messages */
|
/** Used to display status messages */
|
||||||
include_once("../lib/status.inc");
|
include_once("../lib/status.inc");
|
||||||
|
|
Loading…
Reference in New Issue