HEX
Server: Apache
System: Linux scp1.abinfocom.com 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64
User: confeduphaar (1010)
PHP: 8.1.33
Disabled: exec,passthru,shell_exec,system
Upload Files
File: /home/confeduphaar/backip-old-files/administrator/components/com_virtuemart/helpers/vmcrypt.php
<?php
defined ('_JEXEC') or die();

/**
 * virtuemart encrypt class, with some additional behaviours.
 *
 *
 * @package    VirtueMart
 * @subpackage Helpers
 * @author Max Milbers, Valérie Isaksen
 * @copyright Copyright (c) 2014 VirtueMart Team. All rights reserved.
 * @license http://www.gnu.org/copyleft/gpl.html GNU/GPL, see LICENSE.php
 * VirtueMart is free software. This version may have been modified pursuant
 * to the GNU General Public License, and as distributed it includes or
 * is derivative of works licensed under the GNU General Public License or
 * other free or open source software licenses.
 * See /administrator/components/com_virtuemart/COPYRIGHT.php for copyright notices and details.
 *
 * http://virtuemart.net
 */

class vmCrypt {

	const ENCRYPT_SAFEPATH="keys";
	//const VMCIPHER = "aes-128-gcm";
	const VMCIPHER = "AES-128-OFB";
	const VMCIPHER71 = "aes-128-gcm";

	static function encrypt ($string) {

		$key = self::_getKey (0,true);

		if(!empty($key)) {
			if(empty($key['method'])) $key['method'] = '';
			if( $key['method']=='openssl_' and function_exists('openssl_encrypt')){
				//vmdebug('vmCrypt using openssl for encrypt');
				//$iv = self::_getIvOpenSSL ();
				//return base64_encode ( openssl_encrypt( $string, self::VMCIPHER, $key['key'], 0, $iv ) );
				$ivlen = openssl_cipher_iv_length(self::VMCIPHER);
				$iv = openssl_random_pseudo_bytes($ivlen);
				/*if(version_compare(PHP_VERSION, '7.1.0', 'ge')) {
					return base64_encode(openssl_encrypt($string, self::VMCIPHER, $key['key'], $options=OPENSSL_RAW_DATA, $iv));
				} else {*/
					$ciphertext_raw = openssl_encrypt($string, self::VMCIPHER, $key['key'], $options=OPENSSL_RAW_DATA, $iv);
					$hmac = hash_hmac('sha256', $ciphertext_raw, $key['key'], $as_binary=true);
					return base64_encode( $iv.$hmac.$ciphertext_raw );
				//}

			} else
			if( function_exists('mcrypt_encrypt')) {
				// create a random IV to use with CBC encoding
				$iv_size = mcrypt_get_iv_size( MCRYPT_RIJNDAEL_256, MCRYPT_MODE_CBC );
				$iv = mcrypt_create_iv( $iv_size, MCRYPT_RAND );
				//vmdebug('vmCrypt encrypt the used key '.$key);
				return base64_encode( $iv.mcrypt_encrypt( MCRYPT_RIJNDAEL_256, $key['key'], $string, MCRYPT_MODE_CBC, $iv ) );
			}
		}

		vmdebug('vmCrypt no '.$key['method'].' available');
		return base64_encode ($string);
	}

	static function decrypt ($string,$date=0) {

		if(empty($string)) return '';

		$key = self::_getKey ($date,true);
		if(!empty($key)){
			$ciphertext_dec = base64_decode($string);

			if( $key['method']=='openssl_' and function_exists('openssl_decrypt')){
				$ivlen = openssl_cipher_iv_length(self::VMCIPHER);

				/*if(version_compare(PHP_VERSION, '7.1.0', 'ge')) {
					//store $cipher, $iv, and $tag for decryption later
					$iv = openssl_random_pseudo_bytes($ivlen);
					return openssl_decrypt($string, self::VMCIPHER, $key['key'], $options=OPENSSL_RAW_DATA, $iv);
				} else {*/
					$iv = substr($ciphertext_dec, 0, $ivlen);
					$hmac = substr($ciphertext_dec, $ivlen, $sha2len=32);
					$ciphertext_raw = substr($ciphertext_dec, $ivlen+$sha2len);
					$original_plaintext = openssl_decrypt($ciphertext_raw, self::VMCIPHER, $key['key'], $options=OPENSSL_RAW_DATA, $iv);
					$calcmac = hash_hmac('sha256', $ciphertext_raw, $key['key'], $as_binary=true);
					if (hash_equals($hmac, $calcmac))//PHP 5.6+ timing attack safe comparison
					{
						return $original_plaintext;
					} else {
						vmdebug('Timing attack?');
						return $original_plaintext;
					}
				//}


			} else
			if(function_exists('mcrypt_decrypt')){
				$iv_size = mcrypt_get_iv_size(MCRYPT_RIJNDAEL_256, MCRYPT_MODE_CBC);
				//vmdebug('decrypt $iv_size', $iv_size ,MCRYPT_RIJNDAEL_256, MCRYPT_MODE_CBC);
				// retrieves the IV, iv_size should be created using mcrypt_get_iv_size()
				$iv_dec = substr($ciphertext_dec, 0, $iv_size);
				//retrieves the cipher text (everything except the $iv_size in the front)
				$ciphertext_dec = substr($ciphertext_dec, $iv_size);
				//vmdebug('decrypt $iv_dec',$iv_dec,$ciphertext_dec);
				if(empty($iv_dec) and empty($ciphertext_dec)){
					//vmdebug('Seems something not encrytped should be decrypted, return default ',$string);
					return $string;
				} else {
					$mcrypt_decrypt = mcrypt_decrypt (MCRYPT_RIJNDAEL_256, $key['key'], $ciphertext_dec, MCRYPT_MODE_CBC, $iv_dec);
					return rtrim ($mcrypt_decrypt, "\0");
				}

			} else {
				vmdebug('vmCrypt no mcrypt_encrypt available');
				return $ciphertext_dec;
			}

		} else {
			vmdebug('vmCrypt no key available',vmCrypt::$existingKeys);
			return $string;
		}

	}

	private static function _getIvOpenSSL(){

		static $iv = null;
		if($iv===null){
			$ivlen = openssl_cipher_iv_length(self::VMCIPHER);
			$iv = openssl_random_pseudo_bytes($ivlen);
		}
		return $iv;
	}


	private static function _getKey($date, $set = false){
		jimport('joomla.filesystem.file');

		vmSetStartTime('_checkCreateKeyFile');
		if(vmCrypt::$existingKeys===null){
			self::_getExistingKeys();
		}


		if(vmCrypt::$existingKeys and is_array(vmCrypt::$existingKeys) and count(vmCrypt::$existingKeys)>0){
			ksort(vmCrypt::$existingKeys);
			$key = '';
			$usedKey = '';
			$uDate = 0;

			if(empty($date)){
				$date = new JDate('now');
				$date = $date->toUnix();
			}

			if(!empty($date)){

				foreach(vmCrypt::$existingKeys as $unixDate=>$values){
					if(($unixDate) >= $date ){
						//vmdebug('$unixDate '.$unixDate.' >= $date '.$date);
						continue;
					}
					//vmdebug('$unixDate '.$unixDate.' < $date '.$date);
					$usedKey = $values;
					$uDate = $unixDate;
				}
			}

			if( empty($usedKey)){
				$usedKey = end(vmCrypt::$existingKeys);
				$uDate = key(vmCrypt::$existingKeys);
			}

			//No key means, we wanna encrypt something, when it has not the new size,
			//it is an old key and must be replaced
			$ksize = VmConfig::get('keysize',24);
			if(empty($usedKey['key']) or !isset($usedKey['b64']) or !isset($usedKey['size']) or $usedKey['size']!=$ksize or empty($usedKey['method']) or $usedKey['method'] != 'openssl_' ){
				$key = self::_createKeyFile($ksize);
				$k = $key['unixtime'];
				unset($key['unixtime']);
				vmCrypt::$existingKeys[$k] = $key;
				return $set ? $key:$key['key'];
			}

			/*7if( empty($usedKey) or empty($usedKey['method']) ){

				$usedKey = end(vmCrypt::$existingKeys);
				$uDate = key(vmCrypt::$existingKeys);
				//No key means, we wanna encrypt something, when it has not the new size,
				//it is an old key and must be replaced
				$ksize = VmConfig::get('keysize',24);
				if(empty($usedKey['key']) or !isset($usedKey['b64']) or !isset($usedKey['size']) or $usedKey['size']!=$ksize){
					$key = self::_createKeyFile($ksize);
					$k = $key['unixtime'];
					unset($key['unixtime']);
					vmCrypt::$existingKeys[$k] = $key;
					return $set ? $key:$key['key'];
				}
			}*/

			if(!empty($usedKey['key']) and (!isset($usedKey['b64']) or $usedKey['b64']=='1')){

				$usedKey['key'] = base64_decode($usedKey['key']);
				$usedKey['b64'] = 0;
				vmCrypt::$existingKeys[$uDate] = $usedKey;
				//vmCrypt::$existingKeys[$uDate]['b64'] = 0;
				vmdebug('Doing base64_decode '.$usedKey['key']. ' '.$key);
			} /*else {
				$key = $usedKey['key'];
			}*/
			//vmdebug('vmCrypt return key ',$usedKey);
			return $set ? $usedKey:$usedKey['key'];
		} else {
			$key = self::_createKeyFile(VmConfig::get('keysize',24));
			$k = $key['unixtime'];
			unset($key['unixtime']);
			vmCrypt::$existingKeys[$k] = $key;
			return $set ? $key:$key['key'];
		}
	}

	static $existingKeys = null;
	private static function _getExistingKeys(){

		if(vmCrypt::$existingKeys===null){
			$keyPath = self::getEncryptSafepath ();
			if(empty($keyPath)){
				vmCrypt::$existingKeys=false;
				return false;
			}
			$dir = opendir($keyPath);
			if(is_resource($dir)){
				vmCrypt::$existingKeys = array();
				while(false !== ( $file = readdir($dir)) ) {
					if (( $file != '.' ) && ( $file != '..' )) {
						if ( !is_dir($keyPath .DS. $file)) {
							$ext = JFile::getExt($file);
							if($ext=='ini' and $file!='vmm.ini' and file_exists($keyPath .DS. $file)){
								$content = parse_ini_file($keyPath .DS. $file);
								if($content and is_array($content) and isset($content['unixtime'])){
									$k = $content['unixtime'];
									unset($content['unixtime']);
									vmCrypt::$existingKeys[$k] = $content;
									//vmdebug('Reading '.$keyPath .DS. $file,$content);
								}

							} else {
								//vmdebug('Resource says there is file, but does not exists? '.$keyPath .DS. $file);
							}
						} else {
							//vmdebug('Directory in they keyfolder?  '.$keyPath .DS. $file);
						}
					} else {
						//vmdebug('Directory in the keyfolder '.$keyPath .DS. $file);
					}
				}
			} else {
				static $warn = false;
				if(!$warn)vmWarn('Key folder in safepath unaccessible '.$keyPath);
				$warn = true;
				vmCrypt::$existingKeys= false;
			}
		}
		return vmCrypt::$existingKeys;
	}

	private static function _createKeyFile($size = 32){

		$keyPath = self::getEncryptSafepath ();
		if(empty($keyPath)){
			return false;
		}

		$usedKey = date("ymd");
		$filename = $keyPath . DS . $usedKey . '.ini';
		if (!JFile::exists ($filename)) {

			$key = self::crypto_rand_secure($size);
			if(function_exists('openssl_encrypt')){
				$method = 'openssl_';
			} else if(function_exists('mcrypt_encrypt')){
				$method = 'mcrypt_';
			}

			$date = JFactory::getDate();
			$today = $date->toUnix();
			$dat = date("Y-m-d H:i:s");
			$encb64 = 1;
			$content = ';<?php die(); */
						[keys]
						key = "'.base64_encode($key).'"
						unixtime = "'.$today.'"
						date = "'.$dat.'"
						b64 = "'.$encb64.'"
						size = "'.$size.'"
						method = "'.$method.'"
						; */ ?>';
			if(JFile::write($filename, $content)){
				vmdebug('created key file '.$method.' '.$size.' '.$key);
			}

			//b64 must be 0, else it will be b64 decoded again
			return array('key'=>$key,'unixtime'=>$today,'date'=>$dat,'b64'=>0,'size'=>$size);
		} else {
			return false;
		}
	}

	public static function getEncryptSafepath () {

		return ShopFunctions::getSafePathFor(1, self::ENCRYPT_SAFEPATH);
	}

	/**
	 * @deprecated
	 * @param $folderName
	 * @return bool
	 */
	public static function createEncryptFolder ($folderName) {
		jimport('joomla.filesystem.folder');

		if(empty($folderName) or $folderName == VMPATH_ROOT){
			vmdebug('Create EncryptFolder $folderName must not be empty or VMPATH_ROOT',$folderName);
			return false;
		}
		//$folderName = self::_getEncryptSafepath ();

		$exists = JFolder::exists ($folderName);
		if ($exists) {
			return TRUE;
		}
		$created = JFolder::create ($folderName);
		if ($created) {
			return TRUE;
		}
		$uri = JFactory::getURI ();
		$link = $uri->root () . 'administrator/index.php?option=com_virtuemart&view=config';
		VmError (vmText::sprintf ('COM_VIRTUEMART_CANNOT_STORE_CONFIG', $folderName, '<a href="' . $link . '">' . $link . '</a>', vmText::_ ('COM_VIRTUEMART_ADMIN_CFG_MEDIA_FORSALE_PATH')));
		return FALSE;
	}

	/**
	 * Creates a token for inputs by human, some chars are removed to reduce mistyping,
	 * All chars are upper case, 0 and O are omitted
	 *
	 * @author Max Milbers
	 * @param $length
	 * @return string
	 */
	static function getHumanToken($length) {
		return self::getToken( $length, "123456789ABCDEFGHIJKLMNPQRSTUVWXYZ" );
	}

	/**
	 * Creates a token
	 *
	 * @author Max Milbers
	 * @param $length Only keys of sizes 16, 24 or 32 are supported
	 * @param $pool pool to chose from
	 * @return string
	 */
	static function getToken($length=24, $pool = false)
	{
		$token = "";
		if(!$pool){
			$pool = "ABCDEFGHIJKLMNOPQRSTUVWXYZ";
			$pool.= "abcdefghijklmnopqrstuvwxyz";
			$pool.= "0123456789";
		}
		$max = strlen($pool);

		for ($i=0; $i < $length; $i++) {

			$token .= $pool[self::crypto_rand_secure_cover($max)];
		}

		return $token;
	}

	static function getFilteredBytes($size = 32, $filter = '"'){

		$key = self::crypto_rand_secure($size);
		$i = 0;

		if(!is_array($filter)) $filter = array($filter);
		foreach ($filter as $f){
			while(strpos($key,$f)!==false){
				$pos = strpos($key,$f);
				$r = self::crypto_rand_secure(1);
				$key[$pos] = $r;
				if($i++>=($size*2))break;
			}
		}

		return $key;
	}

	static function crypto_rand_secure_cover($range) {

		//$range = $max - $min;
		//if ($range < 1) return $min; // not so random...
		$log = ceil( log( $range, 2 ) );
		$bytes = (int)($log/8) + 1; // length in bytes
		$bits = (int)$log + 1; // length in bits
		$filter = (int)(1 << $bits) - 1; // set all lower bits to 1
		do {

			$rnd = hexdec( bin2hex( self::crypto_rand_secure( $bytes ) ) );
			$rnd = $rnd & $filter; // discard irrelevant bits

		} while( $rnd>=$range );
		//vmdebug('crypto_rand_secure_cover '.$rnd);
		return $rnd;
	}


	/**
	 * Returns random bytes of the desired length
	 * The function with "CAPICOM" is not tested and there for other who may need and fix it.
	 * @author Max Milbers
	 * @param $r
	 * @param int $gen
	 * @return string
	 */
	static function crypto_rand_secure($r) {

		$bytes = '';
		static $used = false;

		if((strlen($bytes) < $r) && function_exists('openssl_random_pseudo_bytes')) {
			$bytes = openssl_random_pseudo_bytes($r);
			//if(!$used){
				//vmdebug('with openssl_random_pseudo_bytes',$bytes); $used = true;
			//}
		}

		if((strlen($bytes) < $r) && function_exists('mcrypt_create_iv'))
		{
			// Use MCRYPT_RAND on Windows hosts with PHP < 5.3.7, otherwise use MCRYPT_DEV_URANDOM
			// (http://bugs.php.net/55169).
			$flag = (version_compare(PHP_VERSION, '5.3.7', '<') && strncasecmp(PHP_OS, 'WIN', 3) == 0) ? MCRYPT_RAND : MCRYPT_DEV_URANDOM ;
			$bytes = mcrypt_create_iv($r,$flag);
			//if(!$used){
				//vmdebug('with mcrypt_create_iv',$bytes); $used = true;
			//}
		}

		if (strlen($bytes) < $r) {

			for($j=0;$j<$r;$j+=16){
				$mt_rand = mt_rand();
				/*$getmypid = '';
				if (function_exists('getmypid'))
					$getmypid .= getmypid();*/
				$memory_get_usage = 1/memory_get_usage();
				$ms = microtime(true);
				$frac = (int)substr((string)$ms - floor($ms),2);

				$random_state = $frac+$mt_rand+$memory_get_usage;
				$t = sha1( $random_state ,true);
				if($j+16>$r){
					$rest = $r-$j;
					$ran = mt_rand(0,15-$rest);
					$bytes .= substr($t,$ran,$rest);
					//vmdebug('mt_rand substr '.$bytes,$t);
				} else {
					$bytes .= $t;
					//vmdebug('just added it '.$bytes,$t);
				}
			}
		}

		return $bytes;
	}

}