2012-04-29 19:15:06 +02:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-11 11:58:15 +02:00
|
|
|
* PrivateBin
|
2012-04-29 19:15:06 +02:00
|
|
|
*
|
|
|
|
* a zero-knowledge paste bin
|
|
|
|
*
|
2016-07-11 11:58:15 +02:00
|
|
|
* @link https://github.com/PrivateBin/PrivateBin
|
2012-04-29 19:15:06 +02:00
|
|
|
* @copyright 2012 Sébastien SAUVAGE (sebsauvage.net)
|
2016-07-19 13:56:52 +02:00
|
|
|
* @license https://www.opensource.org/licenses/zlib-license.php The zlib/libpng License
|
2015-11-09 21:39:42 +01:00
|
|
|
* @version 0.22
|
2012-04-29 19:15:06 +02:00
|
|
|
*/
|
|
|
|
|
2016-07-21 17:09:48 +02:00
|
|
|
namespace PrivateBin;
|
|
|
|
|
2012-04-29 19:15:06 +02:00
|
|
|
/**
|
2016-08-09 11:54:42 +02:00
|
|
|
* Sjcl
|
2012-04-29 19:15:06 +02:00
|
|
|
*
|
|
|
|
* Provides SJCL validation function.
|
|
|
|
*/
|
2016-08-09 11:54:42 +02:00
|
|
|
class Sjcl
|
2012-04-29 19:15:06 +02:00
|
|
|
{
|
|
|
|
/**
|
|
|
|
* SJCL validator
|
|
|
|
*
|
|
|
|
* Checks if a json string is a proper SJCL encrypted message.
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @static
|
|
|
|
* @param string $encoded JSON
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public static function isValid($encoded)
|
|
|
|
{
|
2013-02-23 22:44:46 +01:00
|
|
|
$accepted_keys = array('iv','v','iter','ks','ts','mode','adata','cipher','salt','ct');
|
2012-04-29 19:15:06 +02:00
|
|
|
|
|
|
|
// Make sure content is valid json
|
|
|
|
$decoded = json_decode($encoded);
|
2016-07-26 08:19:35 +02:00
|
|
|
if (is_null($decoded)) {
|
|
|
|
return false;
|
|
|
|
}
|
2012-04-29 19:15:06 +02:00
|
|
|
$decoded = (array) $decoded;
|
|
|
|
|
2012-09-08 19:54:24 +02:00
|
|
|
// Make sure no additionnal keys were added.
|
|
|
|
if (
|
|
|
|
count(array_keys($decoded)) != count($accepted_keys)
|
2016-07-26 08:19:35 +02:00
|
|
|
) {
|
|
|
|
return false;
|
|
|
|
}
|
2012-09-08 19:54:24 +02:00
|
|
|
|
2012-04-29 19:15:06 +02:00
|
|
|
// Make sure required fields are present and contain base64 data.
|
2016-07-26 08:19:35 +02:00
|
|
|
foreach ($accepted_keys as $k) {
|
|
|
|
if (!array_key_exists($k, $decoded)) {
|
|
|
|
return false;
|
|
|
|
}
|
2012-04-29 19:15:06 +02:00
|
|
|
}
|
|
|
|
|
2013-02-23 22:44:46 +01:00
|
|
|
// Make sure some fields are base64 data.
|
2016-07-26 08:19:35 +02:00
|
|
|
if (!base64_decode($decoded['iv'], true)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!base64_decode($decoded['salt'], true)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!($ct = base64_decode($decoded['ct'], true))) {
|
|
|
|
return false;
|
|
|
|
}
|
2013-02-23 22:44:46 +01:00
|
|
|
|
2012-04-29 19:15:06 +02:00
|
|
|
// Make sure some fields have a reasonable size.
|
2016-07-26 08:19:35 +02:00
|
|
|
if (strlen($decoded['iv']) > 24) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (strlen($decoded['salt']) > 14) {
|
|
|
|
return false;
|
|
|
|
}
|
2012-04-29 19:15:06 +02:00
|
|
|
|
2013-02-23 22:44:46 +01:00
|
|
|
// Make sure some fields contain no unsupported values.
|
2016-07-26 08:19:35 +02:00
|
|
|
if (!(is_int($decoded['v']) || is_float($decoded['v'])) || (float) $decoded['v'] < 1) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!is_int($decoded['iter']) || $decoded['iter'] <= 100) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!in_array($decoded['ks'], array(128, 192, 256), true)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!in_array($decoded['ts'], array(64, 96, 128), true)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!in_array($decoded['mode'], array('ccm', 'ocb2', 'gcm'), true)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if ($decoded['cipher'] !== 'aes') {
|
|
|
|
return false;
|
|
|
|
}
|
2013-02-23 22:44:46 +01:00
|
|
|
|
2012-09-08 19:54:24 +02:00
|
|
|
// Reject data if entropy is too low
|
2016-07-26 08:19:35 +02:00
|
|
|
if (strlen($ct) > strlen(gzdeflate($ct))) {
|
|
|
|
return false;
|
|
|
|
}
|
2012-09-08 19:54:24 +02:00
|
|
|
|
2012-04-29 19:15:06 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|