summaryrefslogtreecommitdiffstats
path: root/Auth/OpenID/CryptUtil.php
blob: 79af8c709b723bf48ce22a5dc1bbeb2ed17e65a3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
<?php

/**
 * CryptUtil: A suite of wrapper utility functions for the OpenID
 * library.
 *
 * PHP versions 4 and 5
 *
 * LICENSE: See the COPYING file included in this distribution.
 *
 * @access private
 * @package OpenID
 * @author JanRain, Inc. <openid@janrain.com>
 * @copyright 2005 Janrain, Inc.
 * @license http://www.gnu.org/copyleft/lesser.html LGPL
 */

if (!defined('Auth_OpenID_RAND_SOURCE')) {
    /**
     * The filename for a source of random bytes. Define this yourself
     * if you have a different source of randomness.
     */
    define('Auth_OpenID_RAND_SOURCE', '/dev/urandom');
}

/** 
 * Get the specified number of random bytes.
 *
 * Attempts to use a cryptographically secure (not predictable) source
 * of randomness if available. If there is no high-entropy randomness
 * source available, it will fail. As a last resort, for non-critical
 * systems, define <code>Auth_OpenID_RAND_SOURCE</code> as
 * <code>null</code>, and the code will fall back on a pseudo-random
 * number generator.
 *
 * @param int $num_bytes The length of the return value
 * @return string $bytes random bytes
 */
function Auth_OpenID_getBytes($num_bytes)
{
    static $f = null;
    $bytes = '';
    if ($f === null) {
        if (Auth_OpenID_RAND_SOURCE === null) {
            trigger_error("Using insecure randomness source", E_USER_NOTICE);
            $f = false;
        } else {
            $f = @fopen(Auth_OpenID_RAND_SOURCE, "r");
            if ($f === false) {
                $msg = 'Define Auth_OpenID_RAND_SOURCE as null to continue ' .
                    'with an insecure random number generator.';
                trigger_error($msg, E_USER_ERROR);
            }
        }
    }
    if ($f === false) {
        // pseudorandom used
        $bytes = '';
        for ($i = 0; $i < $num_bytes; $i += 4) {
            $bytes .= pack('L', mt_rand());
        }
        $bytes = substr($bytes, 0, $num_bytes);
    } else {
        $bytes = fread($f, $num_bytes);
    }
    return $bytes;
}

/**
 * Produce a string of length random bytes, chosen from chrs.  If
 * $chrs is null, the resulting string may contain any characters.
 *
 * @param integer $length The length of the resulting
 * randomly-generated string
 * @param string $chrs A string of characters from which to choose
 * to build the new string
 * @return string $result A string of randomly-chosen characters
 * from $chrs
 */
function Auth_OpenID_randomString($length, $population = null)
{
    if ($population === null) {
        return Auth_OpenID_getBytes($length);
    }

    $popsize = strlen($population);

    if ($popsize > 256) {
        $msg = 'More than 256 characters supplied to ' . __FUNCTION__;
        trigger_error($msg, E_USER_ERROR);
    }

    $duplicate = 256 % $popsize;

    $str = "";
    for ($i = 0; $i < $length; $i++) {
        do {
            $n = ord(Auth_OpenID_getBytes(1));
        } while ($n < $duplicate);

        $n %= $popsize;
        $str .= $population[$n];
    }

    return $str;
}

?>