Crypt.php 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334
  1. <?php
  2. class Crypt {
  3. public static function getDesKey() {
  4. // TODO: mv to Config
  5. $crypto_key_des = 'c+X_d!4eCgOG+*R6D5j+zOP5';
  6. return $crypto_key_des;
  7. }
  8. /**
  9. * Encrypt using 3DES
  10. *
  11. * @param string $clear clear text input
  12. * @param string $key encryption key to retrieve from the configuration, defaults to 'des_key'
  13. * @param boolean $base64 whether or not to base64_encode() the result before returning
  14. *
  15. * @return string encrypted text
  16. */
  17. public static function encrypt($clear, $key = 'des_key', $base64 = true) {
  18. if (!$clear) {
  19. return '';
  20. }
  21. /*-
  22. * Add a single canary byte to the end of the clear text, which
  23. * will help find out how much of padding will need to be removed
  24. * upon decryption; see http://php.net/mcrypt_generic#68082
  25. */
  26. $clear = pack("a*H2", $clear, "80");
  27. if (function_exists('mcrypt_module_open') &&
  28. ($td = mcrypt_module_open(MCRYPT_TripleDES, "", MCRYPT_MODE_CBC, ""))
  29. ) {
  30. $iv = self::create_iv(mcrypt_enc_get_iv_size($td));
  31. mcrypt_generic_init($td, self::getDesKey(), $iv);
  32. $cipher = $iv . mcrypt_generic($td, $clear);
  33. mcrypt_generic_deinit($td);
  34. mcrypt_module_close($td);
  35. }
  36. else {
  37. $des_iv_size = 8;
  38. $iv = self::create_iv($des_iv_size);
  39. $cipher = $iv . self::des(self::getDesKey(), $clear, 1, 1, $iv);
  40. }
  41. return $base64 ? base64_encode($cipher) : $cipher;
  42. }
  43. /**
  44. * Decrypt 3DES-encrypted string
  45. *
  46. * @param string $cipher encrypted text
  47. * @param string $key encryption key to retrieve from the configuration, defaults to 'des_key'
  48. * @param boolean $base64 whether or not input is base64-encoded
  49. *
  50. * @return string decrypted text
  51. */
  52. public static function decrypt($cipher, $key = 'des_key', $base64 = true) {
  53. if (!$cipher) {
  54. return '';
  55. }
  56. $cipher = $base64 ? base64_decode($cipher) : $cipher;
  57. if (function_exists('mcrypt_module_open') &&
  58. ($td = mcrypt_module_open(MCRYPT_TripleDES, "", MCRYPT_MODE_CBC, ""))
  59. ) {
  60. $iv_size = mcrypt_enc_get_iv_size($td);
  61. $iv = substr($cipher, 0, $iv_size);
  62. // session corruption? (#1485970)
  63. if (strlen($iv) < $iv_size) {
  64. return '';
  65. }
  66. $cipher = substr($cipher, $iv_size);
  67. mcrypt_generic_init($td, self::getDesKey(), $iv);
  68. $clear = mdecrypt_generic($td, $cipher);
  69. mcrypt_generic_deinit($td);
  70. mcrypt_module_close($td);
  71. }
  72. else {
  73. $des_iv_size = 8;
  74. $iv = substr($cipher, 0, $des_iv_size);
  75. $cipher = substr($cipher, $des_iv_size);
  76. $clear = self::des(self::getDesKey(), $cipher, 0, 1, $iv);
  77. }
  78. /*-
  79. * Trim PHP's padding and the canary byte; see note in
  80. * rcube::encrypt() and http://php.net/mcrypt_generic#68082
  81. */
  82. $clear = substr(rtrim($clear, "\0"), 0, -1);
  83. return $clear;
  84. }
  85. /**
  86. * Generates encryption initialization vector (IV)
  87. *
  88. * @param int Vector size
  89. *
  90. * @return string Vector string
  91. */
  92. public static function create_iv($size) {
  93. // mcrypt_create_iv() can be slow when system lacks entrophy
  94. // we'll generate IV vector manually
  95. $iv = '';
  96. for ($i = 0; $i < $size; $i++) {
  97. $iv .= chr(mt_rand(0, 255));
  98. }
  99. return $iv;
  100. }
  101. //PHP version
  102. //Paul Tero, July 2001
  103. //http://www.shopable.co.uk/des.html
  104. //
  105. //Optimised for performance with large blocks by Michael Hayworth, November 2001
  106. //http://www.netdealing.com
  107. //
  108. //Converted from JavaScript to PHP by Jim Gibbs, June 2004
  109. //
  110. //THIS SOFTWARE IS PROVIDED "AS IS" AND
  111. //ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  112. //IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  113. //ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  114. //FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  115. //DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  116. //OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  117. //HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  118. //LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  119. //OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  120. //SUCH DAMAGE.
  121. //des
  122. //this takes the key, the message, and whether to encrypt or decrypt
  123. public static function des($key, $message, $encrypt, $mode, $iv) {
  124. //declaring this locally speeds things up a bit
  125. $spfunction1 = array (0x1010400,0,0x10000,0x1010404,0x1010004,0x10404,0x4,0x10000,0x400,0x1010400,0x1010404,0x400,0x1000404,0x1010004,0x1000000,0x4,0x404,0x1000400,0x1000400,0x10400,0x10400,0x1010000,0x1010000,0x1000404,0x10004,0x1000004,0x1000004,0x10004,0,0x404,0x10404,0x1000000,0x10000,0x1010404,0x4,0x1010000,0x1010400,0x1000000,0x1000000,0x400,0x1010004,0x10000,0x10400,0x1000004,0x400,0x4,0x1000404,0x10404,0x1010404,0x10004,0x1010000,0x1000404,0x1000004,0x404,0x10404,0x1010400,0x404,0x1000400,0x1000400,0,0x10004,0x10400,0,0x1010004);
  126. $spfunction2 = array (-0x7fef7fe0,-0x7fff8000,0x8000,0x108020,0x100000,0x20,-0x7fefffe0,-0x7fff7fe0,-0x7fffffe0,-0x7fef7fe0,-0x7fef8000,-0x80000000,-0x7fff8000,0x100000,0x20,-0x7fefffe0,0x108000,0x100020,-0x7fff7fe0,0,-0x80000000,0x8000,0x108020,-0x7ff00000,0x100020,-0x7fffffe0,0,0x108000,0x8020,-0x7fef8000,-0x7ff00000,0x8020,0,0x108020,-0x7fefffe0,0x100000,-0x7fff7fe0,-0x7ff00000,-0x7fef8000,0x8000,-0x7ff00000,-0x7fff8000,0x20,-0x7fef7fe0,0x108020,0x20,0x8000,-0x80000000,0x8020,-0x7fef8000,0x100000,-0x7fffffe0,0x100020,-0x7fff7fe0,-0x7fffffe0,0x100020,0x108000,0,-0x7fff8000,0x8020,-0x80000000,-0x7fefffe0,-0x7fef7fe0,0x108000);
  127. $spfunction3 = array (0x208,0x8020200,0,0x8020008,0x8000200,0,0x20208,0x8000200,0x20008,0x8000008,0x8000008,0x20000,0x8020208,0x20008,0x8020000,0x208,0x8000000,0x8,0x8020200,0x200,0x20200,0x8020000,0x8020008,0x20208,0x8000208,0x20200,0x20000,0x8000208,0x8,0x8020208,0x200,0x8000000,0x8020200,0x8000000,0x20008,0x208,0x20000,0x8020200,0x8000200,0,0x200,0x20008,0x8020208,0x8000200,0x8000008,0x200,0,0x8020008,0x8000208,0x20000,0x8000000,0x8020208,0x8,0x20208,0x20200,0x8000008,0x8020000,0x8000208,0x208,0x8020000,0x20208,0x8,0x8020008,0x20200);
  128. $spfunction4 = array (0x802001,0x2081,0x2081,0x80,0x802080,0x800081,0x800001,0x2001,0,0x802000,0x802000,0x802081,0x81,0,0x800080,0x800001,0x1,0x2000,0x800000,0x802001,0x80,0x800000,0x2001,0x2080,0x800081,0x1,0x2080,0x800080,0x2000,0x802080,0x802081,0x81,0x800080,0x800001,0x802000,0x802081,0x81,0,0,0x802000,0x2080,0x800080,0x800081,0x1,0x802001,0x2081,0x2081,0x80,0x802081,0x81,0x1,0x2000,0x800001,0x2001,0x802080,0x800081,0x2001,0x2080,0x800000,0x802001,0x80,0x800000,0x2000,0x802080);
  129. $spfunction5 = array (0x100,0x2080100,0x2080000,0x42000100,0x80000,0x100,0x40000000,0x2080000,0x40080100,0x80000,0x2000100,0x40080100,0x42000100,0x42080000,0x80100,0x40000000,0x2000000,0x40080000,0x40080000,0,0x40000100,0x42080100,0x42080100,0x2000100,0x42080000,0x40000100,0,0x42000000,0x2080100,0x2000000,0x42000000,0x80100,0x80000,0x42000100,0x100,0x2000000,0x40000000,0x2080000,0x42000100,0x40080100,0x2000100,0x40000000,0x42080000,0x2080100,0x40080100,0x100,0x2000000,0x42080000,0x42080100,0x80100,0x42000000,0x42080100,0x2080000,0,0x40080000,0x42000000,0x80100,0x2000100,0x40000100,0x80000,0,0x40080000,0x2080100,0x40000100);
  130. $spfunction6 = array (0x20000010,0x20400000,0x4000,0x20404010,0x20400000,0x10,0x20404010,0x400000,0x20004000,0x404010,0x400000,0x20000010,0x400010,0x20004000,0x20000000,0x4010,0,0x400010,0x20004010,0x4000,0x404000,0x20004010,0x10,0x20400010,0x20400010,0,0x404010,0x20404000,0x4010,0x404000,0x20404000,0x20000000,0x20004000,0x10,0x20400010,0x404000,0x20404010,0x400000,0x4010,0x20000010,0x400000,0x20004000,0x20000000,0x4010,0x20000010,0x20404010,0x404000,0x20400000,0x404010,0x20404000,0,0x20400010,0x10,0x4000,0x20400000,0x404010,0x4000,0x400010,0x20004010,0,0x20404000,0x20000000,0x400010,0x20004010);
  131. $spfunction7 = array (0x200000,0x4200002,0x4000802,0,0x800,0x4000802,0x200802,0x4200800,0x4200802,0x200000,0,0x4000002,0x2,0x4000000,0x4200002,0x802,0x4000800,0x200802,0x200002,0x4000800,0x4000002,0x4200000,0x4200800,0x200002,0x4200000,0x800,0x802,0x4200802,0x200800,0x2,0x4000000,0x200800,0x4000000,0x200800,0x200000,0x4000802,0x4000802,0x4200002,0x4200002,0x2,0x200002,0x4000000,0x4000800,0x200000,0x4200800,0x802,0x200802,0x4200800,0x802,0x4000002,0x4200802,0x4200000,0x200800,0,0x2,0x4200802,0,0x200802,0x4200000,0x800,0x4000002,0x4000800,0x800,0x200002);
  132. $spfunction8 = array (0x10001040,0x1000,0x40000,0x10041040,0x10000000,0x10001040,0x40,0x10000000,0x40040,0x10040000,0x10041040,0x41000,0x10041000,0x41040,0x1000,0x40,0x10040000,0x10000040,0x10001000,0x1040,0x41000,0x40040,0x10040040,0x10041000,0x1040,0,0,0x10040040,0x10000040,0x10001000,0x41040,0x40000,0x41040,0x40000,0x10041000,0x1000,0x40,0x10040040,0x1000,0x41040,0x10001000,0x40,0x10000040,0x10040000,0x10040040,0x10000000,0x40000,0x10001040,0,0x10041040,0x40040,0x10000040,0x10040000,0x10001000,0x10001040,0,0x10041040,0x41000,0x41000,0x1040,0x1040,0x40040,0x10000000,0x10041000);
  133. $masks = array (4294967295,2147483647,1073741823,536870911,268435455,134217727,67108863,33554431,16777215,8388607,4194303,2097151,1048575,524287,262143,131071,65535,32767,16383,8191,4095,2047,1023,511,255,127,63,31,15,7,3,1,0);
  134. //create the 16 or 48 subkeys we will need
  135. $keys = self::des_createKeys($key);
  136. $m=0;
  137. $len = strlen($message);
  138. $chunk = 0;
  139. //set up the loops for single and triple des
  140. $iterations = ((count($keys) == 32) ? 3 : 9); //single or triple des
  141. if ($iterations == 3) {$looping = (($encrypt) ? array (0, 32, 2) : array (30, -2, -2));}
  142. else {$looping = (($encrypt) ? array (0, 32, 2, 62, 30, -2, 64, 96, 2) : array (94, 62, -2, 32, 64, 2, 30, -2, -2));}
  143. $message .= (chr(0) . chr(0) . chr(0) . chr(0) . chr(0) . chr(0) . chr(0) . chr(0)); //pad the message out with null bytes
  144. //store the result here
  145. $result = "";
  146. $tempresult = "";
  147. if ($mode == 1) { //CBC mode
  148. $cbcleft = (ord($iv{$m++}) << 24) | (ord($iv{$m++}) << 16) | (ord($iv{$m++}) << 8) | ord($iv{$m++});
  149. $cbcright = (ord($iv{$m++}) << 24) | (ord($iv{$m++}) << 16) | (ord($iv{$m++}) << 8) | ord($iv{$m++});
  150. $m=0;
  151. }
  152. //loop through each 64 bit chunk of the message
  153. while ($m < $len) {
  154. $left = (ord($message{$m++}) << 24) | (ord($message{$m++}) << 16) | (ord($message{$m++}) << 8) | ord($message{$m++});
  155. $right = (ord($message{$m++}) << 24) | (ord($message{$m++}) << 16) | (ord($message{$m++}) << 8) | ord($message{$m++});
  156. //for Cipher Block Chaining mode, xor the message with the previous result
  157. if ($mode == 1) {if ($encrypt) {$left ^= $cbcleft; $right ^= $cbcright;} else {$cbcleft2 = $cbcleft; $cbcright2 = $cbcright; $cbcleft = $left; $cbcright = $right;}}
  158. //first each 64 but chunk of the message must be permuted according to IP
  159. $temp = (($left >> 4 & $masks[4]) ^ $right) & 0x0f0f0f0f; $right ^= $temp; $left ^= ($temp << 4);
  160. $temp = (($left >> 16 & $masks[16]) ^ $right) & 0x0000ffff; $right ^= $temp; $left ^= ($temp << 16);
  161. $temp = (($right >> 2 & $masks[2]) ^ $left) & 0x33333333; $left ^= $temp; $right ^= ($temp << 2);
  162. $temp = (($right >> 8 & $masks[8]) ^ $left) & 0x00ff00ff; $left ^= $temp; $right ^= ($temp << 8);
  163. $temp = (($left >> 1 & $masks[1]) ^ $right) & 0x55555555; $right ^= $temp; $left ^= ($temp << 1);
  164. $left = (($left << 1) | ($left >> 31 & $masks[31]));
  165. $right = (($right << 1) | ($right >> 31 & $masks[31]));
  166. //do this either 1 or 3 times for each chunk of the message
  167. for ($j=0; $j<$iterations; $j+=3) {
  168. $endloop = $looping[$j+1];
  169. $loopinc = $looping[$j+2];
  170. //now go through and perform the encryption or decryption
  171. for ($i=$looping[$j]; $i!=$endloop; $i+=$loopinc) { //for efficiency
  172. $right1 = $right ^ $keys[$i];
  173. $right2 = (($right >> 4 & $masks[4]) | ($right << 28)) ^ $keys[$i+1];
  174. //the result is attained by passing these bytes through the S selection functions
  175. $temp = $left;
  176. $left = $right;
  177. $right = $temp ^ ($spfunction2[($right1 >> 24 & $masks[24]) & 0x3f] | $spfunction4[($right1 >> 16 & $masks[16]) & 0x3f]
  178. | $spfunction6[($right1 >> 8 & $masks[8]) & 0x3f] | $spfunction8[$right1 & 0x3f]
  179. | $spfunction1[($right2 >> 24 & $masks[24]) & 0x3f] | $spfunction3[($right2 >> 16 & $masks[16]) & 0x3f]
  180. | $spfunction5[($right2 >> 8 & $masks[8]) & 0x3f] | $spfunction7[$right2 & 0x3f]);
  181. }
  182. $temp = $left; $left = $right; $right = $temp; //unreverse left and right
  183. } //for either 1 or 3 iterations
  184. //move then each one bit to the right
  185. $left = (($left >> 1 & $masks[1]) | ($left << 31));
  186. $right = (($right >> 1 & $masks[1]) | ($right << 31));
  187. //now perform IP-1, which is IP in the opposite direction
  188. $temp = (($left >> 1 & $masks[1]) ^ $right) & 0x55555555; $right ^= $temp; $left ^= ($temp << 1);
  189. $temp = (($right >> 8 & $masks[8]) ^ $left) & 0x00ff00ff; $left ^= $temp; $right ^= ($temp << 8);
  190. $temp = (($right >> 2 & $masks[2]) ^ $left) & 0x33333333; $left ^= $temp; $right ^= ($temp << 2);
  191. $temp = (($left >> 16 & $masks[16]) ^ $right) & 0x0000ffff; $right ^= $temp; $left ^= ($temp << 16);
  192. $temp = (($left >> 4 & $masks[4]) ^ $right) & 0x0f0f0f0f; $right ^= $temp; $left ^= ($temp << 4);
  193. //for Cipher Block Chaining mode, xor the message with the previous result
  194. if ($mode == 1) {if ($encrypt) {$cbcleft = $left; $cbcright = $right;} else {$left ^= $cbcleft2; $right ^= $cbcright2;}}
  195. $tempresult .= (chr($left>>24 & $masks[24]) . chr(($left>>16 & $masks[16]) & 0xff) . chr(($left>>8 & $masks[8]) & 0xff) . chr($left & 0xff) . chr($right>>24 & $masks[24]) . chr(($right>>16 & $masks[16]) & 0xff) . chr(($right>>8 & $masks[8]) & 0xff) . chr($right & 0xff));
  196. $chunk += 8;
  197. if ($chunk == 512) {$result .= $tempresult; $tempresult = ""; $chunk = 0;}
  198. } //for every 8 characters, or 64 bits in the message
  199. //return the result as an array
  200. return ($result . $tempresult);
  201. }
  202. /**
  203. * des_createKeys
  204. * this takes as input a 64 bit key (even though only 56 bits are used)
  205. * as an array of 2 integers, and returns 16 48 bit keys
  206. */
  207. public static function des_createKeys($key) {
  208. //declaring this locally speeds things up a bit
  209. $pc2bytes0 = array (0,0x4,0x20000000,0x20000004,0x10000,0x10004,0x20010000,0x20010004,0x200,0x204,0x20000200,0x20000204,0x10200,0x10204,0x20010200,0x20010204);
  210. $pc2bytes1 = array (0,0x1,0x100000,0x100001,0x4000000,0x4000001,0x4100000,0x4100001,0x100,0x101,0x100100,0x100101,0x4000100,0x4000101,0x4100100,0x4100101);
  211. $pc2bytes2 = array (0,0x8,0x800,0x808,0x1000000,0x1000008,0x1000800,0x1000808,0,0x8,0x800,0x808,0x1000000,0x1000008,0x1000800,0x1000808);
  212. $pc2bytes3 = array (0,0x200000,0x8000000,0x8200000,0x2000,0x202000,0x8002000,0x8202000,0x20000,0x220000,0x8020000,0x8220000,0x22000,0x222000,0x8022000,0x8222000);
  213. $pc2bytes4 = array (0,0x40000,0x10,0x40010,0,0x40000,0x10,0x40010,0x1000,0x41000,0x1010,0x41010,0x1000,0x41000,0x1010,0x41010);
  214. $pc2bytes5 = array (0,0x400,0x20,0x420,0,0x400,0x20,0x420,0x2000000,0x2000400,0x2000020,0x2000420,0x2000000,0x2000400,0x2000020,0x2000420);
  215. $pc2bytes6 = array (0,0x10000000,0x80000,0x10080000,0x2,0x10000002,0x80002,0x10080002,0,0x10000000,0x80000,0x10080000,0x2,0x10000002,0x80002,0x10080002);
  216. $pc2bytes7 = array (0,0x10000,0x800,0x10800,0x20000000,0x20010000,0x20000800,0x20010800,0x20000,0x30000,0x20800,0x30800,0x20020000,0x20030000,0x20020800,0x20030800);
  217. $pc2bytes8 = array (0,0x40000,0,0x40000,0x2,0x40002,0x2,0x40002,0x2000000,0x2040000,0x2000000,0x2040000,0x2000002,0x2040002,0x2000002,0x2040002);
  218. $pc2bytes9 = array (0,0x10000000,0x8,0x10000008,0,0x10000000,0x8,0x10000008,0x400,0x10000400,0x408,0x10000408,0x400,0x10000400,0x408,0x10000408);
  219. $pc2bytes10 = array (0,0x20,0,0x20,0x100000,0x100020,0x100000,0x100020,0x2000,0x2020,0x2000,0x2020,0x102000,0x102020,0x102000,0x102020);
  220. $pc2bytes11 = array (0,0x1000000,0x200,0x1000200,0x200000,0x1200000,0x200200,0x1200200,0x4000000,0x5000000,0x4000200,0x5000200,0x4200000,0x5200000,0x4200200,0x5200200);
  221. $pc2bytes12 = array (0,0x1000,0x8000000,0x8001000,0x80000,0x81000,0x8080000,0x8081000,0x10,0x1010,0x8000010,0x8001010,0x80010,0x81010,0x8080010,0x8081010);
  222. $pc2bytes13 = array (0,0x4,0x100,0x104,0,0x4,0x100,0x104,0x1,0x5,0x101,0x105,0x1,0x5,0x101,0x105);
  223. $masks = array (4294967295,2147483647,1073741823,536870911,268435455,134217727,67108863,33554431,16777215,8388607,4194303,2097151,1048575,524287,262143,131071,65535,32767,16383,8191,4095,2047,1023,511,255,127,63,31,15,7,3,1,0);
  224. //how many iterations (1 for des, 3 for triple des)
  225. $iterations = ((strlen($key) >= 24) ? 3 : 1);
  226. //stores the return keys
  227. $keys = array (); // size = 32 * iterations but you don't specify this in php
  228. //now define the left shifts which need to be done
  229. $shifts = array (0, 0, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0);
  230. //other variables
  231. $m=0;
  232. $n=0;
  233. for ($j=0; $j<$iterations; $j++) { //either 1 or 3 iterations
  234. $left = (ord($key{$m++}) << 24) | (ord($key{$m++}) << 16) | (ord($key{$m++}) << 8) | ord($key{$m++});
  235. $right = (ord($key{$m++}) << 24) | (ord($key{$m++}) << 16) | (ord($key{$m++}) << 8) | ord($key{$m++});
  236. $temp = (($left >> 4 & $masks[4]) ^ $right) & 0x0f0f0f0f; $right ^= $temp; $left ^= ($temp << 4);
  237. $temp = (($right >> 16 & $masks[16]) ^ $left) & 0x0000ffff; $left ^= $temp; $right ^= ($temp << -16);
  238. $temp = (($left >> 2 & $masks[2]) ^ $right) & 0x33333333; $right ^= $temp; $left ^= ($temp << 2);
  239. $temp = (($right >> 16 & $masks[16]) ^ $left) & 0x0000ffff; $left ^= $temp; $right ^= ($temp << -16);
  240. $temp = (($left >> 1 & $masks[1]) ^ $right) & 0x55555555; $right ^= $temp; $left ^= ($temp << 1);
  241. $temp = (($right >> 8 & $masks[8]) ^ $left) & 0x00ff00ff; $left ^= $temp; $right ^= ($temp << 8);
  242. $temp = (($left >> 1 & $masks[1]) ^ $right) & 0x55555555; $right ^= $temp; $left ^= ($temp << 1);
  243. //the right side needs to be shifted and to get the last four bits of the left side
  244. $temp = ($left << 8) | (($right >> 20 & $masks[20]) & 0x000000f0);
  245. //left needs to be put upside down
  246. $left = ($right << 24) | (($right << 8) & 0xff0000) | (($right >> 8 & $masks[8]) & 0xff00) | (($right >> 24 & $masks[24]) & 0xf0);
  247. $right = $temp;
  248. //now go through and perform these shifts on the left and right keys
  249. for ($i=0; $i < count($shifts); $i++) {
  250. //shift the keys either one or two bits to the left
  251. if ($shifts[$i] > 0) {
  252. $left = (($left << 2) | ($left >> 26 & $masks[26]));
  253. $right = (($right << 2) | ($right >> 26 & $masks[26]));
  254. } else {
  255. $left = (($left << 1) | ($left >> 27 & $masks[27]));
  256. $right = (($right << 1) | ($right >> 27 & $masks[27]));
  257. }
  258. $left = $left & -0xf;
  259. $right = $right & -0xf;
  260. //now apply PC-2, in such a way that E is easier when encrypting or decrypting
  261. //this conversion will look like PC-2 except only the last 6 bits of each byte are used
  262. //rather than 48 consecutive bits and the order of lines will be according to
  263. //how the S selection functions will be applied: S2, S4, S6, S8, S1, S3, S5, S7
  264. $lefttemp = $pc2bytes0[$left >> 28 & $masks[28]] | $pc2bytes1[($left >> 24 & $masks[24]) & 0xf]
  265. | $pc2bytes2[($left >> 20 & $masks[20]) & 0xf] | $pc2bytes3[($left >> 16 & $masks[16]) & 0xf]
  266. | $pc2bytes4[($left >> 12 & $masks[12]) & 0xf] | $pc2bytes5[($left >> 8 & $masks[8]) & 0xf]
  267. | $pc2bytes6[($left >> 4 & $masks[4]) & 0xf];
  268. $righttemp = $pc2bytes7[$right >> 28 & $masks[28]] | $pc2bytes8[($right >> 24 & $masks[24]) & 0xf]
  269. | $pc2bytes9[($right >> 20 & $masks[20]) & 0xf] | $pc2bytes10[($right >> 16 & $masks[16]) & 0xf]
  270. | $pc2bytes11[($right >> 12 & $masks[12]) & 0xf] | $pc2bytes12[($right >> 8 & $masks[8]) & 0xf]
  271. | $pc2bytes13[($right >> 4 & $masks[4]) & 0xf];
  272. $temp = (($righttemp >> 16 & $masks[16]) ^ $lefttemp) & 0x0000ffff;
  273. $keys[$n++] = $lefttemp ^ $temp; $keys[$n++] = $righttemp ^ ($temp << 16);
  274. }
  275. } //for each iterations
  276. //return the keys we've created
  277. return $keys;
  278. }
  279. /*
  280. function stringToHex ($s) {
  281. $r = "0x";
  282. $hexes = array ("0","1","2","3","4","5","6","7","8","9","a","b","c","d","e","f");
  283. for ($i=0; $i<strlen($s); $i++) {$r .= ($hexes [(ord($s{$i}) >> 4)] . $hexes [(ord($s{$i}) & 0xf)]);}
  284. return $r;
  285. }
  286. echo "<PRE>";
  287. $key = "this is a 24 byte key !!";
  288. $message = "This is a test message";
  289. $ciphertext = des ($key, $message, 1, 0, null);
  290. echo "DES Test Encrypted: " . stringToHex ($ciphertext);
  291. $recovered_message = des ($key, $ciphertext, 0, 0, null);
  292. echo "\n";
  293. echo "DES Test Decrypted: " . $recovered_message;
  294. */
  295. }