refactored hash function to word settings
This commit is contained in:
parent
483a167500
commit
703e34137b
@ -25,59 +25,6 @@ namespace PhpOffice\PhpWord\Metadata;
|
|||||||
*/
|
*/
|
||||||
class Protection
|
class Protection
|
||||||
{
|
{
|
||||||
static $algorithmMapping = [
|
|
||||||
1 => 'md2',
|
|
||||||
2 => 'md4',
|
|
||||||
3 => 'md5',
|
|
||||||
4 => 'sha1',
|
|
||||||
5 => '', // 'mac' -> not possible with hash()
|
|
||||||
6 => 'ripemd',
|
|
||||||
7 => 'ripemd160',
|
|
||||||
8 => '',
|
|
||||||
9 => '', //'hmac' -> not possible with hash()
|
|
||||||
10 => '',
|
|
||||||
11 => '',
|
|
||||||
12 => 'sha256',
|
|
||||||
13 => 'sha384',
|
|
||||||
14 => 'sha512',
|
|
||||||
];
|
|
||||||
static $initialCodeArray = [
|
|
||||||
0xE1F0,
|
|
||||||
0x1D0F,
|
|
||||||
0xCC9C,
|
|
||||||
0x84C0,
|
|
||||||
0x110C,
|
|
||||||
0x0E10,
|
|
||||||
0xF1CE,
|
|
||||||
0x313E,
|
|
||||||
0x1872,
|
|
||||||
0xE139,
|
|
||||||
0xD40F,
|
|
||||||
0x84F9,
|
|
||||||
0x280C,
|
|
||||||
0xA96A,
|
|
||||||
0x4EC3
|
|
||||||
];
|
|
||||||
static $encryptionMatrix =
|
|
||||||
[
|
|
||||||
[0xAEFC, 0x4DD9, 0x9BB2, 0x2745, 0x4E8A, 0x9D14, 0x2A09],
|
|
||||||
[0x7B61, 0xF6C2, 0xFDA5, 0xEB6B, 0xC6F7, 0x9DCF, 0x2BBF],
|
|
||||||
[0x4563, 0x8AC6, 0x05AD, 0x0B5A, 0x16B4, 0x2D68, 0x5AD0],
|
|
||||||
[0x0375, 0x06EA, 0x0DD4, 0x1BA8, 0x3750, 0x6EA0, 0xDD40],
|
|
||||||
[0xD849, 0xA0B3, 0x5147, 0xA28E, 0x553D, 0xAA7A, 0x44D5],
|
|
||||||
[0x6F45, 0xDE8A, 0xAD35, 0x4A4B, 0x9496, 0x390D, 0x721A],
|
|
||||||
[0xEB23, 0xC667, 0x9CEF, 0x29FF, 0x53FE, 0xA7FC, 0x5FD9],
|
|
||||||
[0x47D3, 0x8FA6, 0x0F6D, 0x1EDA, 0x3DB4, 0x7B68, 0xF6D0],
|
|
||||||
[0xB861, 0x60E3, 0xC1C6, 0x93AD, 0x377B, 0x6EF6, 0xDDEC],
|
|
||||||
[0x45A0, 0x8B40, 0x06A1, 0x0D42, 0x1A84, 0x3508, 0x6A10],
|
|
||||||
[0xAA51, 0x4483, 0x8906, 0x022D, 0x045A, 0x08B4, 0x1168],
|
|
||||||
[0x76B4, 0xED68, 0xCAF1, 0x85C3, 0x1BA7, 0x374E, 0x6E9C],
|
|
||||||
[0x3730, 0x6E60, 0xDCC0, 0xA9A1, 0x4363, 0x86C6, 0x1DAD],
|
|
||||||
[0x3331, 0x6662, 0xCCC4, 0x89A9, 0x0373, 0x06E6, 0x0DCC],
|
|
||||||
[0x1021, 0x2042, 0x4084, 0x8108, 0x1231, 0x2462, 0x48C4]
|
|
||||||
];
|
|
||||||
static $passwordMaxLength = 15;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Editing restriction none|readOnly|comments|trackedChanges|forms
|
* Editing restriction none|readOnly|comments|trackedChanges|forms
|
||||||
*
|
*
|
||||||
@ -91,28 +38,28 @@ class Protection
|
|||||||
*
|
*
|
||||||
* @var string
|
* @var string
|
||||||
*/
|
*/
|
||||||
private $password;
|
private $password = '';
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Number of hashing iterations
|
* Number of hashing iterations
|
||||||
*
|
*
|
||||||
* @var int
|
* @var int
|
||||||
*/
|
*/
|
||||||
private $spinCount = 100000;
|
private $spinCount = 0;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Algorithm-SID according to self::$algorithmMapping
|
* Algorithm-SID (see to \PhpOffice\PhpWord\Writer\Word2007\Part\Settings::$algorithmMapping)
|
||||||
*
|
*
|
||||||
* @var int
|
* @var int
|
||||||
*/
|
*/
|
||||||
private $algorithmSid = 4;
|
private $algorithmSid = 0;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Hashed salt
|
* Hashed salt
|
||||||
*
|
*
|
||||||
* @var string
|
* @var string
|
||||||
*/
|
*/
|
||||||
private $salt;
|
private $salt = '';
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Create a new instance
|
* Create a new instance
|
||||||
@ -165,7 +112,7 @@ class Protection
|
|||||||
*/
|
*/
|
||||||
public function setPassword($password)
|
public function setPassword($password)
|
||||||
{
|
{
|
||||||
$this->password = $this->getPasswordHash($password);
|
$this->password = $password;
|
||||||
|
|
||||||
return $this;
|
return $this;
|
||||||
}
|
}
|
||||||
@ -204,7 +151,7 @@ class Protection
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Set algorithm-sid (see self::$algorithmMapping)
|
* Set algorithm-sid (see \PhpOffice\PhpWord\Writer\Word2007\Part\Settings::$algorithmMapping)
|
||||||
*
|
*
|
||||||
* @param $algorithmSid
|
* @param $algorithmSid
|
||||||
* @return self
|
* @return self
|
||||||
@ -238,128 +185,4 @@ class Protection
|
|||||||
|
|
||||||
return $this;
|
return $this;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Get algorithm from self::$algorithmMapping
|
|
||||||
*
|
|
||||||
* @return string
|
|
||||||
*/
|
|
||||||
private function getAlgorithm()
|
|
||||||
{
|
|
||||||
$algorithm = self::$algorithmMapping[$this->algorithmSid];
|
|
||||||
if ($algorithm == '') {
|
|
||||||
$algorithm = 'sha1';
|
|
||||||
}
|
|
||||||
|
|
||||||
return $algorithm;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Create a hashed password that MS Word will be able to work with
|
|
||||||
*
|
|
||||||
* @param string $password
|
|
||||||
* @return string
|
|
||||||
*/
|
|
||||||
private function getPasswordHash($password)
|
|
||||||
{
|
|
||||||
$orig_encoding = mb_internal_encoding();
|
|
||||||
mb_internal_encoding("UTF-8");
|
|
||||||
|
|
||||||
if (empty($password)) {
|
|
||||||
return '';
|
|
||||||
}
|
|
||||||
|
|
||||||
$password = mb_substr($password, 0, min(self::$passwordMaxLength, mb_strlen($password)));
|
|
||||||
|
|
||||||
// Construct a new NULL-terminated string consisting of single-byte characters:
|
|
||||||
// Get the single-byte values by iterating through the Unicode characters of the truncated password.
|
|
||||||
// For each character, if the low byte is not equal to 0, take it. Otherwise, take the high byte.
|
|
||||||
$pass_utf8 = mb_convert_encoding($password, 'UCS-2LE', 'UTF-8');
|
|
||||||
$byteChars = [];
|
|
||||||
for ($i = 0; $i < mb_strlen($password); $i++) {
|
|
||||||
$byteChars[$i] = ord(substr($pass_utf8, $i * 2, 1));
|
|
||||||
if ($byteChars[$i] == 0) {
|
|
||||||
$byteChars[$i] = ord(substr($pass_utf8, $i * 2 + 1, 1));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// build low-order word and hig-order word and combine them
|
|
||||||
$combinedKey = $this->buildCombinedKey($byteChars);
|
|
||||||
// build reversed hexadecimal string
|
|
||||||
$hex = strtoupper(dechex($combinedKey & 0xFFFFFFFF));
|
|
||||||
$reversedHex = $hex[6].$hex[7].$hex[4].$hex[5].$hex[2].$hex[3].$hex[0].$hex[1];
|
|
||||||
|
|
||||||
$generatedKey = mb_convert_encoding($reversedHex, 'UCS-2LE', 'UTF-8');
|
|
||||||
|
|
||||||
// Implementation Notes List:
|
|
||||||
// Word requires that the initial hash of the password with the salt not be considered in the count.
|
|
||||||
// The initial hash of salt + key is not included in the iteration count.
|
|
||||||
$generatedKey = hash($this->getAlgorithm(), base64_decode($this->getSalt()) . $generatedKey, true);
|
|
||||||
for ($i = 0; $i < $this->getSpinCount(); $i++) {
|
|
||||||
$generatedKey = hash($this->getAlgorithm(), $generatedKey . pack("CCCC", $i, $i>>8, $i>>16, $i>>24), true);
|
|
||||||
}
|
|
||||||
$generatedKey = base64_encode($generatedKey);
|
|
||||||
|
|
||||||
mb_internal_encoding($orig_encoding);
|
|
||||||
|
|
||||||
return $generatedKey;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Build combined key from low-order word and high-order word
|
|
||||||
*
|
|
||||||
* @param array $byteChars -> byte array representation of password
|
|
||||||
* @return int
|
|
||||||
*/
|
|
||||||
private function buildCombinedKey($byteChars)
|
|
||||||
{
|
|
||||||
// Compute the high-order word
|
|
||||||
// Initialize from the initial code array (see above), depending on the passwords length.
|
|
||||||
$highOrderWord = self::$initialCodeArray[sizeof($byteChars) - 1];
|
|
||||||
|
|
||||||
// For each character in the password:
|
|
||||||
// For every bit in the character, starting with the least significant and progressing to (but excluding)
|
|
||||||
// the most significant, if the bit is set, XOR the key’s high-order word with the corresponding word from
|
|
||||||
// the Encryption Matrix
|
|
||||||
for ($i = 0; $i < sizeof($byteChars); $i++) {
|
|
||||||
$tmp = self::$passwordMaxLength - sizeof($byteChars) + $i;
|
|
||||||
$matrixRow = self::$encryptionMatrix[$tmp];
|
|
||||||
for ($intBit = 0; $intBit < 7; $intBit++) {
|
|
||||||
if (($byteChars[$i] & (0x0001 << $intBit)) != 0) {
|
|
||||||
$highOrderWord = ($highOrderWord ^ $matrixRow[$intBit]);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Compute low-order word
|
|
||||||
// Initialize with 0
|
|
||||||
$lowOrderWord = 0;
|
|
||||||
// For each character in the password, going backwards
|
|
||||||
for ($i = sizeof($byteChars) - 1; $i >= 0; $i--) {
|
|
||||||
// low-order word = (((low-order word SHR 14) AND 0x0001) OR (low-order word SHL 1) AND 0x7FFF)) XOR character
|
|
||||||
$lowOrderWord = (((($lowOrderWord >> 14) & 0x0001) | (($lowOrderWord << 1) & 0x7FFF)) ^ $byteChars[$i]);
|
|
||||||
}
|
|
||||||
// Lastly, low-order word = (((low-order word SHR 14) AND 0x0001) OR (low-order word SHL 1) AND 0x7FFF)) XOR strPassword length XOR 0xCE4B.
|
|
||||||
$lowOrderWord = (((($lowOrderWord >> 14) & 0x0001) | (($lowOrderWord << 1) & 0x7FFF)) ^ sizeof($byteChars) ^ 0xCE4B);
|
|
||||||
|
|
||||||
// Combine the Low and High Order Word
|
|
||||||
return $this->int32(($highOrderWord << 16) + $lowOrderWord);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* simulate behaviour of int32
|
|
||||||
*
|
|
||||||
* @param int $value
|
|
||||||
* @return int
|
|
||||||
*/
|
|
||||||
private function int32($value)
|
|
||||||
{
|
|
||||||
$value = ($value & 0xFFFFFFFF);
|
|
||||||
|
|
||||||
if ($value & 0x80000000) {
|
|
||||||
$value = -((~$value & 0xFFFFFFFF) + 1);
|
|
||||||
}
|
|
||||||
|
|
||||||
return $value;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -24,6 +24,59 @@ namespace PhpOffice\PhpWord\Writer\Word2007\Part;
|
|||||||
*/
|
*/
|
||||||
class Settings extends AbstractPart
|
class Settings extends AbstractPart
|
||||||
{
|
{
|
||||||
|
static $algorithmMapping = [
|
||||||
|
1 => 'md2',
|
||||||
|
2 => 'md4',
|
||||||
|
3 => 'md5',
|
||||||
|
4 => 'sha1',
|
||||||
|
5 => '', // 'mac' -> not possible with hash()
|
||||||
|
6 => 'ripemd',
|
||||||
|
7 => 'ripemd160',
|
||||||
|
8 => '',
|
||||||
|
9 => '', //'hmac' -> not possible with hash()
|
||||||
|
10 => '',
|
||||||
|
11 => '',
|
||||||
|
12 => 'sha256',
|
||||||
|
13 => 'sha384',
|
||||||
|
14 => 'sha512',
|
||||||
|
];
|
||||||
|
static $initialCodeArray = [
|
||||||
|
0xE1F0,
|
||||||
|
0x1D0F,
|
||||||
|
0xCC9C,
|
||||||
|
0x84C0,
|
||||||
|
0x110C,
|
||||||
|
0x0E10,
|
||||||
|
0xF1CE,
|
||||||
|
0x313E,
|
||||||
|
0x1872,
|
||||||
|
0xE139,
|
||||||
|
0xD40F,
|
||||||
|
0x84F9,
|
||||||
|
0x280C,
|
||||||
|
0xA96A,
|
||||||
|
0x4EC3
|
||||||
|
];
|
||||||
|
static $encryptionMatrix =
|
||||||
|
[
|
||||||
|
[0xAEFC, 0x4DD9, 0x9BB2, 0x2745, 0x4E8A, 0x9D14, 0x2A09],
|
||||||
|
[0x7B61, 0xF6C2, 0xFDA5, 0xEB6B, 0xC6F7, 0x9DCF, 0x2BBF],
|
||||||
|
[0x4563, 0x8AC6, 0x05AD, 0x0B5A, 0x16B4, 0x2D68, 0x5AD0],
|
||||||
|
[0x0375, 0x06EA, 0x0DD4, 0x1BA8, 0x3750, 0x6EA0, 0xDD40],
|
||||||
|
[0xD849, 0xA0B3, 0x5147, 0xA28E, 0x553D, 0xAA7A, 0x44D5],
|
||||||
|
[0x6F45, 0xDE8A, 0xAD35, 0x4A4B, 0x9496, 0x390D, 0x721A],
|
||||||
|
[0xEB23, 0xC667, 0x9CEF, 0x29FF, 0x53FE, 0xA7FC, 0x5FD9],
|
||||||
|
[0x47D3, 0x8FA6, 0x0F6D, 0x1EDA, 0x3DB4, 0x7B68, 0xF6D0],
|
||||||
|
[0xB861, 0x60E3, 0xC1C6, 0x93AD, 0x377B, 0x6EF6, 0xDDEC],
|
||||||
|
[0x45A0, 0x8B40, 0x06A1, 0x0D42, 0x1A84, 0x3508, 0x6A10],
|
||||||
|
[0xAA51, 0x4483, 0x8906, 0x022D, 0x045A, 0x08B4, 0x1168],
|
||||||
|
[0x76B4, 0xED68, 0xCAF1, 0x85C3, 0x1BA7, 0x374E, 0x6E9C],
|
||||||
|
[0x3730, 0x6E60, 0xDCC0, 0xA9A1, 0x4363, 0x86C6, 0x1DAD],
|
||||||
|
[0x3331, 0x6662, 0xCCC4, 0x89A9, 0x0373, 0x06E6, 0x0DCC],
|
||||||
|
[0x1021, 0x2042, 0x4084, 0x8108, 0x1231, 0x2462, 0x48C4]
|
||||||
|
];
|
||||||
|
static $passwordMaxLength = 15;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Settings value
|
* Settings value
|
||||||
*
|
*
|
||||||
@ -169,8 +222,8 @@ class Settings extends AbstractPart
|
|||||||
'w:cryptAlgorithmType' => 'typeAny',
|
'w:cryptAlgorithmType' => 'typeAny',
|
||||||
'w:cryptAlgorithmSid' => $protection->getAlgorithmSid(),
|
'w:cryptAlgorithmSid' => $protection->getAlgorithmSid(),
|
||||||
'w:cryptSpinCount' => $protection->getSpinCount(),
|
'w:cryptSpinCount' => $protection->getSpinCount(),
|
||||||
'w:hash' => $protection->getPassword(),
|
'w:hash' => $this->getPasswordHash($protection),
|
||||||
'w:salt' => $protection->getSalt(),
|
'w:salt' => $this->getSaltHash($protection->getSalt()),
|
||||||
)
|
)
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
@ -193,4 +246,146 @@ class Settings extends AbstractPart
|
|||||||
));
|
));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Create a hashed password that MS Word will be able to work with
|
||||||
|
*
|
||||||
|
* @param \PhpOffice\PhpWord\Metadata\Protection $protection
|
||||||
|
* @return string
|
||||||
|
*/
|
||||||
|
private function getPasswordHash($protection)
|
||||||
|
{
|
||||||
|
$orig_encoding = mb_internal_encoding();
|
||||||
|
mb_internal_encoding("UTF-8");
|
||||||
|
|
||||||
|
$password = $protection->getPassword();
|
||||||
|
$password = mb_substr($password, 0, min(self::$passwordMaxLength, mb_strlen($password)));
|
||||||
|
|
||||||
|
// Construct a new NULL-terminated string consisting of single-byte characters:
|
||||||
|
// Get the single-byte values by iterating through the Unicode characters of the truncated password.
|
||||||
|
// For each character, if the low byte is not equal to 0, take it. Otherwise, take the high byte.
|
||||||
|
$pass_utf8 = mb_convert_encoding($password, 'UCS-2LE', 'UTF-8');
|
||||||
|
$byteChars = [];
|
||||||
|
for ($i = 0; $i < mb_strlen($password); $i++) {
|
||||||
|
$byteChars[$i] = ord(substr($pass_utf8, $i * 2, 1));
|
||||||
|
if ($byteChars[$i] == 0) {
|
||||||
|
$byteChars[$i] = ord(substr($pass_utf8, $i * 2 + 1, 1));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// build low-order word and hig-order word and combine them
|
||||||
|
$combinedKey = $this->buildCombinedKey($byteChars);
|
||||||
|
// build reversed hexadecimal string
|
||||||
|
$hex = strtoupper(dechex($combinedKey & 0xFFFFFFFF));
|
||||||
|
$reversedHex = $hex[6].$hex[7].$hex[4].$hex[5].$hex[2].$hex[3].$hex[0].$hex[1];
|
||||||
|
|
||||||
|
$generatedKey = mb_convert_encoding($reversedHex, 'UCS-2LE', 'UTF-8');
|
||||||
|
|
||||||
|
// Implementation Notes List:
|
||||||
|
// Word requires that the initial hash of the password with the salt not be considered in the count.
|
||||||
|
// The initial hash of salt + key is not included in the iteration count.
|
||||||
|
$algorithm = $this->getAlgorithm($protection->getAlgorithmSid());
|
||||||
|
$generatedKey = hash($algorithm, base64_decode($this->getSaltHash($protection->getSalt())) . $generatedKey, true);
|
||||||
|
|
||||||
|
$spinCount = (!empty($protection->getSpinCount())) ? $protection->getSpinCount() : 100000;
|
||||||
|
|
||||||
|
for ($i = 0; $i < $spinCount; $i++) {
|
||||||
|
$generatedKey = hash($algorithm, $generatedKey . pack("CCCC", $i, $i>>8, $i>>16, $i>>24), true);
|
||||||
|
}
|
||||||
|
$generatedKey = base64_encode($generatedKey);
|
||||||
|
|
||||||
|
mb_internal_encoding($orig_encoding);
|
||||||
|
|
||||||
|
return $generatedKey;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get algorithm from self::$algorithmMapping
|
||||||
|
*
|
||||||
|
* @param int $sid
|
||||||
|
* @return string
|
||||||
|
*/
|
||||||
|
private function getAlgorithm($sid)
|
||||||
|
{
|
||||||
|
if (empty($sid)) {
|
||||||
|
$sid = 4;
|
||||||
|
}
|
||||||
|
|
||||||
|
$algorithm = self::$algorithmMapping[$sid];
|
||||||
|
if ($algorithm == '') {
|
||||||
|
$algorithm = 'sha1';
|
||||||
|
}
|
||||||
|
|
||||||
|
return $algorithm;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get salt hash
|
||||||
|
*
|
||||||
|
* @param string $salt
|
||||||
|
* @return string
|
||||||
|
*/
|
||||||
|
private function getSaltHash($salt)
|
||||||
|
{
|
||||||
|
return $salt;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Build combined key from low-order word and high-order word
|
||||||
|
*
|
||||||
|
* @param array $byteChars -> byte array representation of password
|
||||||
|
* @return int
|
||||||
|
*/
|
||||||
|
private function buildCombinedKey($byteChars)
|
||||||
|
{
|
||||||
|
// Compute the high-order word
|
||||||
|
// Initialize from the initial code array (see above), depending on the passwords length.
|
||||||
|
$highOrderWord = self::$initialCodeArray[sizeof($byteChars) - 1];
|
||||||
|
|
||||||
|
// For each character in the password:
|
||||||
|
// For every bit in the character, starting with the least significant and progressing to (but excluding)
|
||||||
|
// the most significant, if the bit is set, XOR the key’s high-order word with the corresponding word from
|
||||||
|
// the Encryption Matrix
|
||||||
|
for ($i = 0; $i < sizeof($byteChars); $i++) {
|
||||||
|
$tmp = self::$passwordMaxLength - sizeof($byteChars) + $i;
|
||||||
|
$matrixRow = self::$encryptionMatrix[$tmp];
|
||||||
|
for ($intBit = 0; $intBit < 7; $intBit++) {
|
||||||
|
if (($byteChars[$i] & (0x0001 << $intBit)) != 0) {
|
||||||
|
$highOrderWord = ($highOrderWord ^ $matrixRow[$intBit]);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Compute low-order word
|
||||||
|
// Initialize with 0
|
||||||
|
$lowOrderWord = 0;
|
||||||
|
// For each character in the password, going backwards
|
||||||
|
for ($i = sizeof($byteChars) - 1; $i >= 0; $i--) {
|
||||||
|
// low-order word = (((low-order word SHR 14) AND 0x0001) OR (low-order word SHL 1) AND 0x7FFF)) XOR character
|
||||||
|
$lowOrderWord = (((($lowOrderWord >> 14) & 0x0001) | (($lowOrderWord << 1) & 0x7FFF)) ^ $byteChars[$i]);
|
||||||
|
}
|
||||||
|
// Lastly, low-order word = (((low-order word SHR 14) AND 0x0001) OR (low-order word SHL 1) AND 0x7FFF)) XOR strPassword length XOR 0xCE4B.
|
||||||
|
$lowOrderWord = (((($lowOrderWord >> 14) & 0x0001) | (($lowOrderWord << 1) & 0x7FFF)) ^ sizeof($byteChars) ^ 0xCE4B);
|
||||||
|
|
||||||
|
// Combine the Low and High Order Word
|
||||||
|
return $this->int32(($highOrderWord << 16) + $lowOrderWord);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Simulate behaviour of int32
|
||||||
|
*
|
||||||
|
* @param int $value
|
||||||
|
* @return int
|
||||||
|
*/
|
||||||
|
private function int32($value)
|
||||||
|
{
|
||||||
|
$value = ($value & 0xFFFFFFFF);
|
||||||
|
|
||||||
|
if ($value & 0x80000000) {
|
||||||
|
$value = -((~$value & 0xFFFFFFFF) + 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
return $value;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user