View source
<?php
define("AES_PASSWORD_MAX_LENGTH", 128);
define("CRYPT_AES_MODE", 1);
function aes_menu() {
$items = array();
$items['admin/settings/aes'] = array(
'title' => 'AES settings',
'description' => 'Configure the AES encryption module.',
'page callback' => 'drupal_get_form',
'page arguments' => array(
'aes_config',
),
'access arguments' => array(
'administer aes',
),
'type' => MENU_NORMAL_ITEM,
);
$items['user/%/password'] = array(
'title' => 'View password',
'page callback' => 'aes_get_password',
'page arguments' => array(
1,
true,
),
'access callback' => 'aes_show_password_page',
'access arguments' => array(
'view passwords',
1,
),
'type' => MENU_LOCAL_TASK,
);
return $items;
}
function aes_perm() {
return array(
'administer aes',
'view passwords',
);
}
function aes_load_phpsec() {
$phpsec_include_path = dirname(__FILE__) . "/phpseclib";
if (file_exists($phpsec_include_path . '/Crypt/AES.php') === false) {
return -2;
}
else {
if (is_readable($phpsec_include_path . '/Crypt/AES.php') === false) {
drupal_set_message(t("It appears that phpseclib is installed in the right location but can't be read. Check that the permissions on the directory and its files allows for reading by the webserver."));
return -3;
}
else {
if (function_exists("set_include_path") == false) {
return -1;
}
set_include_path(get_include_path() . PATH_SEPARATOR . $phpsec_include_path);
include_once 'Crypt/AES.php';
return true;
}
}
}
function aes_show_password_page($access, $uid) {
$viewing_method = variable_get("aes_viewing_method", "collapsible");
if (user_access($access) && aes_password_exists($uid) && ($viewing_method == "page" || $viewing_method == "both")) {
return true;
}
else {
return false;
}
}
function aes_config() {
$phpsec_load_result = aes_load_phpsec();
$phpsec_loaded = false;
if ($phpsec_load_result > 0) {
$phpsec_loaded = true;
}
else {
if ($phpsec_load_result == -1) {
$phpseclib_error_msg = " <span style=\"color:#f00;\">Warning: phpseclib was found but can't be loaded since this sever doesn't allow setting the PHP include path.</span>";
}
else {
if ($phpsec_load_result == -2) {
}
else {
if ($phpsec_load_result == -3) {
$phpseclib_error_msg = " <span style=\"color:#f00;\">Warning: phpseclib was found but couldn't be read, check permissions.</span>";
}
}
}
}
if (file_exists(variable_get("aes_key_path", "")) && is_writable(variable_get("aes_key_path", "")) == false && variable_get("aes_key_storage_method", "") == "File") {
drupal_set_message(t("The keyfile %keyfile_path is not writable. This module needs to be able to write to this file to update the encryption key.", array(
'%keyfile_path' => variable_get("aes_key_path", ""),
)), "error");
}
$form = array();
$form['aes'] = array(
'#type' => 'fieldset',
'#title' => t('AES settings'),
'#collapsible' => false,
);
$form['aes']['aes_convert'] = array(
'#type' => 'checkbox',
'#title' => t('Create AES passwords'),
'#default_value' => variable_get("aes_convert", "false") == "true" ? true : false,
'#description' => t('Check this box if you would like for AES to start encrypting user passwords (and make them viewable to the roles with permission to do so). This is a process which normally will make more and more passwords AES-encrypted/readable over time since the AES module only can get an existing users password in plain text at certain moments, one such moment being when the user logs in. So you won\'t be able to view an existing users password until that user has logged in at least once after you checked this box. You may test this on yourself by logging out and in again, which should make your password appear on your user page.'),
);
$encryption_implementations = array();
if ($phpsec_loaded) {
$encryption_implementations["phpseclib"] = "PHP Secure Communications Library (phpseclib)";
}
if (extension_loaded("mcrypt")) {
$encryption_implementations["mcrypt"] = "Mcrypt extension";
}
if (!empty($encryption_implementations["mcrypt"]) && !empty($encryption_implementations["phpseclib"])) {
$implementations_description = "The Mcrypt implementation is the (only) implementation this module used until support for phpseclib was added. The Mcrypt implementation is faster than phpseclib and also lets you define the cipher to be used, other than that, the two implementations are equivalent.";
}
else {
if (!empty($encryption_implementations["mcrypt"]) && empty($encryption_implementations["phpseclib"])) {
$implementations_description = "The Mcrypt extension is the only installed implementation." . $phpseclib_error_msg;
}
else {
if (empty($encryption_implementations["mcrypt"]) && !empty($encryption_implementations["phpseclib"])) {
$implementations_description = "PHP Secure Communications Library is the only installed implementation.";
}
}
}
if (empty($encryption_implementations)) {
$encryption_implementations = array(
'None!',
);
drupal_set_message(t("You do not have an AES implementation installed!"), "error");
}
$form['aes']['aes_implementation'] = array(
'#type' => 'select',
'#title' => t('AES implementation'),
'#options' => $encryption_implementations,
'#default_value' => variable_get("aes_implementation", "mcrypt"),
'#description' => $implementations_description,
);
$form['aes']['view_method'] = array(
'#type' => 'select',
'#title' => t('Method for viewing passwords'),
'#options' => array(
'collapsible' => t('Collapsible box'),
'page' => t('Own page'),
'both' => t('Both'),
),
'#default_value' => variable_get("aes_viewing_method", "collapsible"),
'#description' => t('Wether to show the password as a collapsible box on the user info page (collapsed/hidden by default) or on a separate page with a tab on the user page, or both.'),
);
if (variable_get("aes_implementation", "mcrypt") == "phpseclib") {
$cipher_select_value = "rijndael-128";
$cipher_select_disabled = true;
$cipher_description = t("Cipher is locked to Rijndael 128 when using the phpseclib implementation.");
}
else {
$cipher_select_value = variable_get("aes_cipher", "rijndael-128");
$cipher_select_disabled = false;
}
$form['aes']['aes_cipher'] = array(
'#type' => 'select',
'#title' => t('Cipher'),
'#options' => array(
'rijndael-128' => 'Rijndael 128',
'rijndael-192' => 'Rijndael 192',
'rijndael-256' => 'Rijndael 256',
),
'#default_value' => $cipher_select_value,
'#disabled' => $cipher_select_disabled,
'#description' => $cipher_description,
);
$form['aes']['aes_key_storage_method'] = array(
'#type' => 'select',
'#title' => t('Key storage method'),
'#options' => array(
'Database' => 'Database',
'File' => 'File',
),
'#default_value' => variable_get("aes_key_storage_method", ""),
'#description' => t('If possible, you should use the file storage method and assign a path below.'),
);
$form['aes']['aes_key_path'] = array(
'#type' => 'textfield',
'#title' => t('Path to keyfile'),
'#default_value' => variable_get("aes_key_path", ""),
'#description' => t('The path, including the filename, of the file in which to store your key. The access restrictions on this file should be set as high as possible while still allowing PHP read/write access.'),
);
$form['aes']['aes_key'] = array(
'#type' => 'password',
'#title' => t('Key'),
'#description' => t("The key for your encryption system. You normally don't need to worry about this since this module will generate a key for you if none is specified. However you have the option of using your own custom key here."),
);
$form['aes']['aes_key_c'] = array(
'#type' => 'password',
'#title' => t('Confirm key'),
);
$form['aes']['submit'] = array(
'#type' => 'submit',
'#value' => t('Save'),
);
return $form;
}
function aes_config_validate($form, &$form_state) {
if (empty($form_state['values']['aes_implementation'])) {
form_set_error("aes_implementation", t("AES needs an encryption implementation to function. See the README.txt for instructions on how to install one."));
}
if (!empty($form_state['values']['aes_key'])) {
if ($form_state['values']['aes_key'] !== $form_state['values']['aes_key_c']) {
form_set_error("aes_key", t("The encryption keys didn't match."));
}
}
if ($form_state['values']['aes_key_storage_method'] == "File") {
$fp = @fopen($form_state['values']['aes_key_path'], "a");
if ($fp === false) {
form_set_error("aes_key_path", t("Can't write to the specified location."));
}
else {
fclose($fp);
}
}
}
function aes_config_submit($form, &$form_state) {
if ($form_state['values']['aes_convert']) {
if (variable_get("aes_convert", "true") == "false") {
variable_set("aes_convert", "true");
drupal_set_message(t("Creation of encrypted passwords enabled."));
}
}
else {
if (variable_get("aes_convert", "true") == "true") {
variable_set("aes_convert", "false");
drupal_set_message(t("Creation of encrypted passwords disabled."));
}
}
variable_set("aes_key_path", $form_state['values']['aes_key_path']);
if ($form_state['values']['aes_key_storage_method'] != variable_get("aes_key_storage_method", "")) {
drupal_set_message(t("Switching key storage method to !method.", array(
'!method' => $form_state['values']['aes_key_storage_method'],
)));
$key = aes_get_key();
aes_delete_key(variable_get("aes_key_storage_method", ""));
variable_set("aes_key_storage_method", $form_state['values']['aes_key_storage_method']);
aes_store_key($key);
}
if ($form_state['values']['aes_cipher'] != variable_get("aes_cipher", "rijndael-128")) {
$result = db_query("SELECT uid, pass FROM {aes_passwords} WHERE uid != 0");
$old_cipher = variable_get("aes_cipher", "rijndael-128");
variable_set("aes_cipher", $form_state['values']['aes_cipher']);
$new_cipher = $form_state['values']['aes_cipher'];
$old_iv = variable_get("aes_encryption_iv", "");
variable_set("aes_cipher", $form_state['values']['aes_cipher']);
aes_make_iv();
$new_iv = variable_get("aes_encryption_iv", "");
$updates_num = 0;
while ($user = db_fetch_array($result)) {
$plain_pass = aes_decrypt($user['pass'], true, null, $old_cipher, $old_iv);
$new_pass = aes_encrypt($plain_pass, true, null, $new_cipher, $new_iv);
$updates_num++;
db_query("UPDATE {aes_passwords} SET pass='%s' WHERE uid=%d", $new_pass, $user['uid']);
}
drupal_set_message(t("Updated the passwords of !updates_num users because of a change in cipher.", array(
'!updates_num' => $updates_num,
)));
}
if (!empty($form_state['values']['aes_key'])) {
$old_key = aes_get_key();
$result = aes_store_key($form_state['values']['aes_key']);
if ($result === false) {
drupal_set_message(t("Failed to write new encryption key! Aborting."));
return;
}
drupal_set_message(t("Key changed."));
$a = db_query("SELECT uid, pass FROM {aes_passwords} WHERE uid != 0");
$updates_num = 0;
while ($user = db_fetch_array($a)) {
$plain_pass = aes_decrypt($user['pass'], true, $old_key);
$new_pass = aes_encrypt($plain_pass, true, $form_state['values']['aes_key']);
$updates_num++;
db_query("UPDATE {aes_passwords} SET pass='%s' WHERE uid=%d", $new_pass, $user['uid']);
}
drupal_set_message(t("Updated the passwords of !updates_num users because of a change in key.", array(
'!updates_num' => $updates_num,
)));
}
if ($form_state['values']['aes_implementation'] != variable_get("aes_implementation", "mcrypt")) {
drupal_set_message(t("Implementation changed. Re-encrypting all passwords using new implementation."));
$a = db_query("SELECT uid, pass FROM {aes_passwords} WHERE uid != 0");
$updates_num = 0;
while ($user = db_fetch_array($a)) {
$plain_pass = aes_decrypt($user['pass']);
$new_pass = aes_encrypt($plain_pass, true, null, null, null, $form_state['values']['aes_implementation']);
$updates_num++;
db_query("UPDATE {aes_passwords} SET pass='%s' WHERE uid=%d", $new_pass, $user['uid']);
}
drupal_set_message(t("Updated the passwords of !updates_num users because of a change in implementation.", array(
'!updates_num' => $updates_num,
)));
variable_set("aes_implementation", $form_state['values']['aes_implementation']);
if ($form_state['values']['aes_implementation'] == "phpseclib") {
variable_set("aes_cipher", "rijndael-128");
aes_make_iv(true);
}
}
variable_set("aes_viewing_method", $form_state['values']['view_method']);
}
function aes_user($op, &$edit, &$account, $category = null) {
if ($op == "view") {
if (user_access('view passwords') && (variable_get("aes_viewing_method", "page") == "collapsible" || variable_get("aes_viewing_method", "page") == "both") && aes_password_exists($account->uid)) {
$account->content['info']['aes_password'] = array(
'#type' => 'user_profile_item',
'#title' => t('Password'),
'#value' => drupal_get_form('aes_view_password_form', aes_get_password($account->uid, true)),
);
}
}
if ($op == "login") {
if (variable_get("aes_convert", "true") == "true" && aes_password_exists($account->uid) == false) {
db_query("INSERT INTO {aes_passwords} (uid, pass) VALUES (%d, '%s')", $account->uid, aes_encrypt($edit['pass']));
}
}
if ($op == "update" || $op == "insert") {
if (!empty($edit['pass']) && $account->uid) {
$password = aes_encrypt($edit['pass']);
if (strlen($password) > AES_PASSWORD_MAX_LENGTH) {
$edit['pass'] = null;
drupal_set_message(t("Couldn't update AES password since it's too long.", "error"));
}
else {
if (aes_password_exists($account->uid) == false) {
if (variable_get("aes_convert", "true") == "true") {
db_query("INSERT INTO {aes_passwords} (uid, pass) VALUES (%d, '%s')", $account->uid, $password);
}
}
else {
db_query("UPDATE {aes_passwords} SET pass='%s' WHERE uid=%d", $password, $account->uid);
}
}
}
}
if ($op == "delete") {
db_query("DELETE FROM {aes_passwords} WHERE uid=%d", $account->uid);
}
}
function aes_view_password_form($form_state, $password) {
$form['password'] = array(
'#type' => 'fieldset',
'#title' => t('Show password'),
'#description' => $password,
'#collapsible' => true,
'#collapsed' => true,
);
return $form;
}
function aes_password_exists($uid) {
$result = db_query("SELECT uid FROM {aes_passwords} WHERE uid=%d", $uid);
if (db_fetch_array($result) !== false) {
return true;
}
else {
return false;
}
}
function aes_get_password($uid, $decrypt = false) {
$result = db_query("SELECT pass FROM {aes_passwords} WHERE uid=%d", $uid);
$user = db_fetch_array($result);
if ($user === false) {
return false;
}
else {
if ($decrypt) {
return aes_decrypt($user['pass']);
}
else {
return $user['pass'];
}
}
}
function aes_get_key() {
$storage_method = variable_get("aes_key_storage_method", "database");
if ($storage_method == "Database") {
$key = variable_get("aes_key", false);
if ($key === false) {
$key = aes_make_key();
aes_store_key($key);
watchdog("aes", "AES module made a new key since one couldn't be found by using the database storage method.");
}
}
if ($storage_method == "File") {
$key = file_get_contents(variable_get("aes_key_path", ""));
if ($key === false) {
$key = aes_make_key();
aes_store_key($key);
watchdog("aes", "AES module made a new key since one couldn't be found by using the file storage method.");
}
}
return $key;
}
function aes_store_key($key) {
$storage_method = variable_get("aes_key_storage_method", "Database");
if ($storage_method == "Database") {
variable_set("aes_key", $key);
}
else {
if ($storage_method == "File") {
$fp = fopen(variable_get("aes_key_path", ""), "w");
if ($fp === false) {
drupal_set_message(t("Couldn't write key to file " . variable_get("aes_key_path", "")), "error");
return false;
}
$key = fwrite($fp, $key);
fclose($fp);
}
else {
drupal_set_message(t("Unknown storage method in AES module."), "error");
return false;
}
}
return true;
}
function aes_delete_key($storage_method) {
if ($storage_method == "Database") {
variable_del("aes_key");
}
if ($storage_method == "File") {
$result = unlink(variable_get("aes_key_path", ""));
if ($result === false) {
drupal_set_message(t("Couldn't delete keyfile!"), "error");
}
}
}
function aes_make_key() {
$acceptable = false;
$chars = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890";
while ($acceptable === false) {
$key = "";
while (strlen($key) < 32) {
$key .= substr($chars, rand(0, strlen($chars)), 1);
}
$acceptable = true;
$result = preg_match("/.*[a-z].*/", $key);
if ($result == 0) {
$acceptable = false;
}
$result = preg_match("/.*[A-Z].*/", $key);
if ($result == 0) {
$acceptable = false;
}
$result = preg_match("/.*[0-9].*/", $key);
if ($result == 0) {
$acceptable = false;
}
}
return $key;
}
function aes_make_iv($ignore_implementation = false) {
if (variable_get("aes_implementation", "mcrypt") == "phpseclib" && $ignore_implementation == false) {
watchdog("aes", "Called aes_make_iv when using phpseclib. This is harmless, but shouldn't happen.", array(), WATCHDOG_WARNING);
return;
}
if (strtoupper(substr(PHP_OS, 0, 3)) === "WIN") {
$randgen = MCRYPT_RAND;
}
else {
$randgen = MCRYPT_DEV_URANDOM;
}
$td = mcrypt_module_open(variable_get("aes_cipher", "rijndael-128"), "", MCRYPT_MODE_CBC, "");
$iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td), $randgen);
mcrypt_module_close($td);
variable_set("aes_encryption_iv", base64_encode($iv));
}
function aes_encrypt($string, $base64encode = true, $custom_key = null, $custom_cipher = null, $custom_iv = null, $custom_implementation = null) {
if (empty($string)) {
watchdog("aes", "Tried to encrypt an empty string.", array(), WATCHDOG_WARNING);
return false;
}
if ($custom_cipher != null) {
$cipher = $custom_cipher;
}
else {
$cipher = variable_get("aes_cipher", "rijndael-128");
}
if (!empty($custom_key)) {
$key = $custom_key;
}
else {
$key = aes_get_key();
}
if (is_null($custom_implementation) == false && ($custom_implementation == "mcrypt" || $custom_implementation == "phpseclib")) {
$implementation = $custom_implementation;
}
else {
$implementation = variable_get("aes_implementation", "mcrypt");
}
if ($implementation == "phpseclib") {
if (is_null($custom_cipher) == false) {
watchdog("aes", "A custom cipher was defined when encrypting a string in the AES module using the phpseclib implementation. This implementation doesn't support custom ciphers therefore the argument was ignored and the encryption was done with the standard cipher.", array(), WATCHDOG_WARNING);
}
if (is_null($custom_iv) == false) {
watchdog("aes", "A custom IV was defined when encrypting a string in the AES module using the phpseclib implementation. This implementation doesn't support custom IV's therefore the argument was ignored and the encryption was done with the standard IV.", array(), WATCHDOG_WARNING);
}
aes_load_phpsec();
$phpsec = new Crypt_AES();
$phpsec
->setKey($key);
$encrypted = $phpsec
->encrypt($string);
}
else {
if ($implementation == "mcrypt") {
$td = mcrypt_module_open($cipher, "", MCRYPT_MODE_CBC, "");
if ($custom_iv == null) {
$iv = base64_decode(variable_get("aes_encryption_iv", ""));
}
else {
$iv = base64_decode($custom_iv);
}
if (empty($iv)) {
aes_make_iv();
$iv = base64_decode(variable_get("aes_encryption_iv", ""));
watchdog("aes", "No initialization vector found while trying to encrypt! This could be a bit of a pain since you might have to reset all the passwords for all users. I've created a new one now and will try to carry on as normal.", array(), WATCHDOG_WARNING);
}
$ks = mcrypt_enc_get_key_size($td);
$key = substr(sha1($key), 0, $ks);
mcrypt_generic_init($td, $key, $iv);
$encrypted = mcrypt_generic($td, $string);
mcrypt_generic_deinit($td);
mcrypt_module_close($td);
}
else {
$error_msg = t("Request was sent to encrypt a string with the AES module, but the AES module has no active encryption implementation to work with! Did you forget to run update.php after upgrading this module?");
if (user_access('administer aes')) {
drupal_set_message($error_msg, "error");
}
watchdog("aes", $error_msg, array(), WATCHDOG_ERROR);
return false;
}
}
if ($base64encode) {
return base64_encode($encrypted);
}
else {
return $encrypted;
}
}
function aes_decrypt($string, $base64encoded = true, $custom_key = null, $custom_cipher = null, $custom_iv = null, $custom_implementation = null) {
if (empty($string)) {
watchdog("aes", "Tried to decrypt an empty string.", array(), WATCHDOG_WARNING);
return false;
}
if ($base64encoded) {
$string = base64_decode($string);
}
if ($custom_cipher != null) {
$cipher = $custom_cipher;
}
else {
$cipher = variable_get("aes_cipher", "rijndael-128");
}
if (!empty($custom_key)) {
$key = $custom_key;
}
else {
$key = aes_get_key();
}
if (is_null($custom_implementation) == false && ($custom_implementation == "mcrypt" || $custom_implementation == "phpseclib")) {
$implementation = $custom_implementation;
}
else {
$implementation = variable_get("aes_implementation", "mcrypt");
}
if ($implementation == "phpseclib") {
if (is_null($custom_cipher) == false) {
watchdog("aes", "A custom cipher was defined when decrypting a string in the AES module using the phpseclib implementation. This implementation doesn't support custom ciphers therefore the argument was ignored and the decryption was done with the standard cipher.", array(), WATCHDOG_WARNING);
}
if (is_null($custom_iv) == false) {
watchdog("aes", "A custom IV was defined when decrypting a string in the AES module using the phpseclib implementation. This implementation doesn't support custom IV's therefore the argument was ignored and the decryption was done with the standard IV.", array(), WATCHDOG_WARNING);
}
aes_load_phpsec();
$phpsec = new Crypt_AES();
$phpsec
->setKey($key);
$decrypted = $phpsec
->decrypt($string);
}
else {
if ($implementation == "mcrypt") {
$td = mcrypt_module_open($cipher, "", MCRYPT_MODE_CBC, "");
$ks = mcrypt_enc_get_key_size($td);
if ($custom_iv == null) {
$iv = base64_decode(variable_get("aes_encryption_iv", ""));
}
else {
$iv = base64_decode($custom_iv);
}
if (empty($iv)) {
watchdog("aes", "No initialization vector found while trying to decrypt. Aborting!", array(), WATCHDOG_ERROR);
}
$key = substr(sha1($key), 0, $ks);
mcrypt_generic_init($td, $key, $iv);
$decrypted = mdecrypt_generic($td, $string);
mcrypt_generic_deinit($td);
mcrypt_module_close($td);
}
else {
$error_msg = t("Request was sent to decrypt a string with the AES module, but the AES module has no active encryption implementation to work with! Did you forget to run update.php after upgrading this module?");
if (user_access('administer aes')) {
drupal_set_message($error_msg, "error");
}
watchdog("aes", $error_msg, array(), WATCHDOG_ERROR);
return false;
}
}
return trim($decrypted);
}
function aes_enable() {
if (extension_loaded("mcrypt") === false && aes_load_phpsec() === false) {
drupal_set_message(t("The AES encryption module requires at least one of two things to function: Either the PHP Mcrypt extension has to be installed on the web server. Or the PHP Secure Communications Library (phpseclib) needs to be present in the AES directory. Installing phpseclib is probably the easiest thing to do, you can download a copy at http://phpseclib.sourceforge.net/. Extract the zip file into a directory named \"phpseclib\" inside the \"aes\" module directory and you should be good to go. Check the README.txt for more information."), "warning");
}
if (extension_loaded("mcrypt") === true && aes_load_phpsec() !== true) {
variable_set("aes_implementation", "mcrypt");
}
else {
if (extension_loaded("mcrypt") === false && aes_load_phpsec() === true) {
variable_set("aes_implementation", "phpseclib");
}
else {
if (extension_loaded("mcrypt") === true && aes_load_phpsec() === true) {
variable_set("aes_implementation", "mcrypt");
}
else {
variable_set("aes_implementation", "missing");
}
}
}
if (variable_get("aes_implementation", "mcrypt") == "mcrypt") {
$iv = base64_decode(variable_get("aes_encryption_iv", ""));
if (empty($iv)) {
aes_make_iv();
}
}
aes_get_key();
}